Cyber Security Awareness Workshop

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Cyber Security Awareness Workshop"

Transcription

1 December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing Our ecity Foundation. C-STARR is a regional program, made possible by a Homeland Security grant, and focuses on the cyber threat to the small business community. This program is planned and conducted in conjunction with the Naval Postgraduate School s Center for Asymmetric Warfare. The information contained in this Participant Guide is UNCLASSIFIED and approved for public release.

2 AGENDA Time 8:00 8:15 AM 8:15 8:30 AM Registration and Check-In Event All participants, please sign in and verify your contact information Welcome and Introductions Alan Watkins Program Manager, Regional Cyber Security Program Brendan Applegate Deputy Director for Planning, Center for Asymmetric Warfare 8:30 8:45 AM Keynote Speaker Honorable Mitch Dembin U.S. Magistrate Judge, Southern District of California 8:45 9:15 AM What Keeps You Up at Night? Discussion Alan Watkins Scott Brewer Deputy Director for Operations, Center for Asymmetric Warfare 9:15 9:25 AM Distribute Cyber Security Questionnaire and Break 9:25 9:55 AM Critical Infrastructure Business Impacts Ron Simmons Security Operations Manager, San Diego Gas & Electric Co. 9:55 10:20 AM Questionnaire Work Period 10:20 10:30 AM Break 10:30 11:00 AM 11:00 11:40 AM 11:40 AM 12:05 PM 12:05 12:15 PM Cyber Crime Business Impacts Jason Vickery Sergeant, San Diego County Sheriff, Computer & High-Tech Crimes Task Force Collect and Discuss Questionnaire Highlights Alan Watkins Scott Brewer Overview of Upcoming Cyber Tabletop Exercises Alan Watkins Brendan Applegate Closing Remarks Alan Watkins Brendan Applegate 12:15 PM Adjourn Agenda 1

3 PROGRAM OVERVIEW Participant Guide Program Introduction In 2012, the City of San Diego established a partnership with the Naval Postgraduate School to develop and conduct a comprehensive community-based cyber security program. The intent of this program is to take the first step in developing a sustained regional initiative to address cyber threats to the greater San Diego area, by building on lessons learned from previous cyber programs conducted in Southern California. The San Diego Cyber Security Threat Awareness, Response, and Recovery Program (C- STARR) is a regional program that focuses on the cyber threat to the small business community. In order to accomplish this, C-STARR has been organized into a progressive series of training and exercise events. These events build from awareness and prevention to consequence management, and culminate with the response to a catastrophic attack on critical infrastructure. As the first event in the C-STARR program, the aims to establish a learning environment in which participants can build an understanding of current and developing cyber threats. Targeting private sector management and information technology (IT) professionals, the workshop features regional subject matter experts who will address the following topics, critical to the cyber protection of small- to medium-sized businesses: Cyber attack methods Recent attack case studies Cyber crime detection and prevention Information sharing and protection During the Workshop, participants will complete a Cyber Security Questionnaire that will allow the planning team to identify critical cyber-related issues and concerns. The Questionnaire will serve as a self-evaluation of regional capabilities in cyber security. Specific issues and concerns can then be addressed by the C-STARR planning team in development of exercise scenarios and follow-on plans and initiatives for the region. The will be held at the War Memorial Building, in Balboa Park, on Wednesday, December 5, Tabletop Exercise #1 The first of two Tabletop Exercises (TTX) will focus on the effects and consequences of a cyber attack that affects a number of small businesses. Participants will be divided into breakout groups by their business sector to evaluate regional capabilities to respond to and recover from a power grid failure scenario. The TTX will focus on identifying regional Program Overview 2

4 capabilities available in both the public and private sectors, and on the development of best practices and recommendations for improvement in the following areas: Assessing and managing technical, administrative, and financial impacts Cyber forensics and investigative processes Consequence management Ensuring continuity of business The first Tabletop Exercise will be held at the San Diego Operational Area Emergency Operations Center (EOC) on Wednesday, January 30, Tabletop Exercise #2 Building from lessons learned and critical issues from the first TTX, the second exercise will examine the response and recovery issues surrounding a widespread cyber attack on critical regional infrastructure. Whereas the first exercise focused on the capabilities of individual businesses to respond and recover from a cyber attack, the second will include elements of regional emergency response and consequence management, as a result of widespread damage or degradation of critical infrastructure. Participants will utilize in-place plans and procedures to evaluate regional capabilities to perform the following critical functions: Intrusion detection and mitigation Damage assessment and immediate response Consequence management and recovery Public information and preparedness measures The second Tabletop Exercise will be held at the San Diego Operational Area Emergency Operations Center (EOC) on Wednesday, February 27, Cyber Security Annex Upon completion of the program, observations, recommendation, best practices, and lessons learned will be leveraged to develop a functional annex to the County of San Diego s Operational Area Emergency Plan. This annex will formalize the County s organization and plans to respond to the cyber threat and recover from a large-scale cyber incident. The Cyber Security Annex will also identify regional capabilities, specialized resources, and will define specific roles and responsibilities, in the public and private sector. The C-STARR program is hosted by the City of San Diego and the Securing Our ecity Foundation, through a Homeland Security grant, and is planned and conducted in conjunction with the Naval Postgraduate School s Center for Asymmetric Warfare. Program Overview 3

5 Program Objectives The C-STARR program is intended to be the first step in a sustained regional initiative to improve cyber preparedness in the greater San Diego area, and increase regional capabilities to detect, respond to, and recover from widespread cyber attacks on critical infrastructure and the private sector. Pursuing this intent, the C-STARR planning team has identified the following program objectives: 1. Increase awareness and understanding of current and developing cyber threats and vulnerabilities 2. Examine the consequences of a widespread cyber attack on San Diego critical infrastructure and the private sector 3. Explore the role of the private sector in identifying, countering, and responding to a criminal or terrorist cyber attack 4. Identify actions that can be taken by the private sector and local government to increase cyber security and minimize the effects of cyber attacks 5. Identify future planning, training, and exercise requirements related to cyber crime and cyber security 6. Reinforce the communication and coordination of cyber-related information and intelligence between the private sector, local government, intelligence community, law enforcement, and first responders 7. Explore the ability of local, community, and agency-specific plans to prevent, mitigate, respond to, and recover from a cyber attack 8. Incorporate program recommendations and best practices into a Cyber Security Annex of the San Diego Operational Area Emergency Plan Points of Contact For further information on the C-STARR program, please consult one of the following points of contact: Alan Watkins Program Manager, Regional Cyber Security Program Phone: (619) Brendan Applegate Project Manager, Center for Asymmetric Warfare Phone: (831) Program Overview 4

6 SPEAKER BIOGRAPHIES Honorable Mitch Dembin United States Magistrate Judge, Southern District of California Board of Directors, ESET Foundation Mitch Dembin was sworn in as a United States Magistrate Judge in the Southern District of California on March 18, Prior to his appointment, he was an Assistant U.S. Attorney in San Diego and served as the Cybercrime Coordinator for the office. Before that, he was the Chief Security Advisor for Microsoft Corporation, assisting Microsoft's business customers in creating and implementing strategic security plans. Participant Guide Prior to joining Microsoft, Mitch was the president of EvidentData, Inc., a firm specializing in computer forensics, digital evidence and computer security. Mitch served three different terms as an Assistant U.S. Attorney, spanning more than 15 years in San Diego and in Boston, and including 6 years as a supervisor. As a federal prosecutor, Mitch has specialized in prosecuting a variety of white collar crimes and, beginning in 1991, in investigating and prosecuting high technology crimes. Before his first term as an AUSA, Mitch was a staff attorney for the Securities and Exchange Commission in Washington, DC. Mitch is credited with having founded the San Diego Regional Computer Forensics Laboratory, a national prototype, which provides assistance to the federal, state and local law enforcement agencies serving San Diego and Imperial Counties. Mitch was raised in Brooklyn, New York, the son of a New York City Police Officer, and received a Bachelor's Degree from Brooklyn College of the City University of New York, and a Juris Doctor Degree from Western New England Law School, where he also served as Managing Editor of the Law Review. Ron Simmons Security Operations Manager, San Diego Gas & Electric Co. Mr. Simmons career started as a U.S. Navy Sonar Technician in In mid-1998, he left the Navy and moved into the information technology field. Since his departure from the U.S. Navy, Mr. Simmons has held multiple roles within information security while working in industries such as hosting, financial and insurance services, and most recently critical infrastructure. Since 2008, Mr. Simmons has worked for the Sempra Energy Utilities family of companies, first as the Incident Response and Forensics Speaker Biographies 5

7 Lead. In this role, he and his team have responsibility for the enterprise incident response and forensics of corporate IT infrastructure, as well as the multiple gas and electric controls networks. He now serves as the Security Operations Manager for SDG&E s Information Security Department, overseeing Incident Response and Forensics, Threat and Vulnerability Management, Production Support and Service, Enterprise Access Manager. Jason Vickery Sergeant, San Diego County Sheriff Computer & High-Tech Crimes Task Force Jason Vickery is a sergeant with the San Diego Sheriff s Department, where he has worked for the last eighteen years. His assignments have included detentions, patrol, and investigations. Jason is currently assigned as the Law Enforcement Coordinator for the Computer and Technology Crime High Tech Response Team (CATCH). Jason has a Bachelor s degree from the University of Nebraska Kearney and a Master s degree from the University of Phoenix. Speaker Biographies 6

8 Program Content 7

9 Program Content 8

10 Program Content 9

11 Program Content 10

12 Critical Infrastructure - Business Impacts Ron Simmons CISSP, GCIH, GCIA, GCFA 2002 San Diego Gas and Electric Co. and Southern California Gas Company. All copyright and trademark rights reserved. Program Content 11

13 Program Content 12

14 Program Content 13

15 Program Content 14

16 Program Content 15

17 Program Content 16

18 Program Content 17

19 Program Content 18

20 Program Content 19

21 Program Content 20

22 Program Content 21

23 Program Content 22

24 Program Content 23

25 Program Content 24

26 Program Content 25

27 Program Content 26

28 Program Content 27

29 Program Content 28

30 Program Content 29

31 Program Content 30

32 Program Content 31

33 Program Content 32

34 Program Content 33

35 Program Content 34

36 Program Content 35

37 Program Content 36

38 Program Content 37

39 Program Content 38

40 Naval Postgraduate School, Center for Asymmetric Warfare Web: The San Diego C-STARR Program has been planned and conducted in collaborative partnership with the Center for Asymmetric Warfare, a federal government operational research and field experimentation center aligned under the Naval Postgraduate School s Information Sciences Department. The Center for Asymmetric Warfare, or CAW, was established in 1999 to support military and civilian autorities in identifying, countering, and controlling the effects of asymmetric threats. Since its inception, CAW has matured into a recognized leader in its field, by developing comprehensive education, training, and exercise programs; technology integration, test, and evaluation programs; and capability assessment and improvement programs with its partners in research. Today, CAW is headquartered at Naval Base Ventura County, in Point Mugu, California, but maintains a global reach, conducting programs in 26 countries and U.S. protectorates around the world. CAW programs are a result of cooperative partnerships with organizations across a wide spectrum of jurisdictions, including the Department of Defense; local, state, and federal governments; private sector and non-governmental organizations; academia and national centers of excellence; and international governments. Harnessing the resources and expertise that comprise the Naval Postgraduate School, CAW maintains a unique set of capabilities to meet the research, assessment, or planning needs of any organization. For further information, please contact: Alan Jaeger Brendan Applegate Director and Principal Investigator Deputy Director for Planning Phone: (805) Phone: (831) Center for Asymmetric Warfare 39

PUBLIC SAFETY SUMMIT I. Crime Prevention through Cooperative Policing and Best Practices

PUBLIC SAFETY SUMMIT I. Crime Prevention through Cooperative Policing and Best Practices PUBLIC SAFETY SUMMIT I Crime Prevention through Cooperative Policing and Best Practices Wednesday, January 16, 2013 Greetings, Thank you for taking time out of your busy schedule to attend today s Public

More information

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems Cyber Incident Annex Coordinating Agencies ITS-Information Technology Systems Support Agencies Mississippi Department of Homeland Security Mississippi Emergency Management Agency Mississippi Department

More information

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies: Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice

More information

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic

More information

DHS. CMSI Webinar Series

DHS. CMSI Webinar Series DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Disaster Recovery Coordinators Meeting. April 21, 2011

Disaster Recovery Coordinators Meeting. April 21, 2011 Disaster Recovery Coordinators Meeting April 21, 2011 Meeting Agenda Department of Health Care Services Auditorium 1500 Capitol Avenue Sacramento, CA 95814 9:30 Welcome 9:40 United Alert - www.unitedalert.com

More information

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the

More information

Technology Crime Services

Technology Crime Services Technology Crime Services Presentation Summary Cyber Safety for the Corporate world Challenges to Police how you can assist Making your company crime resistant Reporting Online crime Traditional Policing

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,

More information

Wednesday, March 11, 2015 8:00am to 4:30pm. Seats are filling fast, sign up today!

Wednesday, March 11, 2015 8:00am to 4:30pm. Seats are filling fast, sign up today! EVENT NOTICE Making the Business Case for Cybersecurity & Public-Private Sector Cooperation Wednesday, March 11, 2015 8:00am to 4:30pm Presented by: ISACA - Greater Hartford Chapter Guest Speaker: Judith

More information

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure. MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message

More information

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman

More information

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior

More information

THE ALABAMA CHAPTER OF THE ASSOCIATION OF CERTIFIED FRAUD EXAMINERS AND THE UNIVERSITY OF ALABAMA @ BIRMINGHAM SCHOOL OF BUSINESS

THE ALABAMA CHAPTER OF THE ASSOCIATION OF CERTIFIED FRAUD EXAMINERS AND THE UNIVERSITY OF ALABAMA @ BIRMINGHAM SCHOOL OF BUSINESS THE ALABAMA CHAPTER OF THE ASSOCIATION OF CERTIFIED FRAUD EXAMINERS THE UNIVERSITY OF ALABAMA @ BIRMINGHAM SCHOOL OF BUSINESS DAY ONE Fraud Trends 2012 AND PRESENT OUR 5th ANNUAL TRAINING SEMINAR DATE:

More information

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee

More information

Fast Facts About The Cyber Security Job Market

Fast Facts About The Cyber Security Job Market Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing

More information

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo 2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,

More information

IACP BRIEF CYBER SECURITY ADDRESSING THE NEEDS OF LAW ENFORCEMENT. Serving the Leaders of Today, Developing the Leaders of Tomorrow

IACP BRIEF CYBER SECURITY ADDRESSING THE NEEDS OF LAW ENFORCEMENT. Serving the Leaders of Today, Developing the Leaders of Tomorrow IACP BRIEF Serving the Leaders of Today, Developing the Leaders of Tomorrow CYBER SECURITY: CYBER SECURITY ADDRESSING THE NEEDS OF LAW ENFORCEMENT 1 P age OVERVIEW The International Association of Chiefs

More information

Cybersecurity Workforce Opportunities

Cybersecurity Workforce Opportunities Cybersecurity Workforce Opportunities RI Defense Economy Planning Commission 6 May 2015 The Rhode Island Defense Sector Innovation Focused - Economic Generator The Cybersecurity Need Growing Exponentially

More information

Establishing a State Cyber Crimes Unit White Paper

Establishing a State Cyber Crimes Unit White Paper Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center

More information

Challenges in Cybersecurity. Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard

Challenges in Cybersecurity. Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard Challenges in Cybersecurity Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard Agenda National Perspectives & Background WA State Cyber Planning Steady State/Significant

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

Michael S. McCampbell 1880 Crestview Way Naples, FL 34119 Email: mmccampbell@cipp.org Cell: 954-461-7913

Michael S. McCampbell 1880 Crestview Way Naples, FL 34119 Email: mmccampbell@cipp.org Cell: 954-461-7913 Michael S. McCampbell 1880 Crestview Way Naples, FL 34119 Email: mmccampbell@cipp.org Cell: 954-461-7913 ACCOMPLISHMENTS Twenty-five years experience successfully managing large-scale criminal justice

More information

Member Newsletter: 2015 Year End Update

Member Newsletter: 2015 Year End Update Member Newsletter: 2015 Year End Update ChicagoFIRST in Transition Administration Changes Office Relocation ChicagoFIRST Web Hosting and Crisis Communicator New Members ChicagoFIRST Events & Services Power

More information

U.S. Department of Homeland Security STATEMENT

U.S. Department of Homeland Security STATEMENT U.S. Department of Homeland Security STATEMENT OF PAUL M. KILCOYNE DEPUTY ASSISTANT DIRECTOR OF INVESTIGATIVE SERVICES DIVISION U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT U.S. DEPARTMENT OF HOMELAND SECURITY

More information

Seminar-at-a-Glance. 5th Annual Oklahoma Cyber Security Seminar. NOVEMBER 30 - DECEMBER 1, 2009 Page 1 of 10

Seminar-at-a-Glance. 5th Annual Oklahoma Cyber Security Seminar. NOVEMBER 30 - DECEMBER 1, 2009 Page 1 of 10 Seminar-at-a-Glance 5th Annual Oklahoma Cyber Security Seminar Page 1 of 10 Moore Norman Technology Center South Penn Campus 13301 South Pennsylvania Avenue Oklahoma City, OK 73170 DAY ONE: November 30

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

STATEMENT OF DAVID A. O NEIL ACTING ASSISTANT ATTORNEY GENERAL CRIMINAL DIVISION UNITED STATES DEPARTMENT OF JUSTICE BEFORE THE

STATEMENT OF DAVID A. O NEIL ACTING ASSISTANT ATTORNEY GENERAL CRIMINAL DIVISION UNITED STATES DEPARTMENT OF JUSTICE BEFORE THE STATEMENT OF DAVID A. O NEIL ACTING ASSISTANT ATTORNEY GENERAL CRIMINAL DIVISION UNITED STATES DEPARTMENT OF JUSTICE BEFORE THE COMMITTEE ON OVERSIGHT & GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT OPERATIONS

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015 The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a

More information

Resume. Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918. University of Colorado Colorado Springs, Colorado

Resume. Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918. University of Colorado Colorado Springs, Colorado Resume Name: Address: Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918 Contact Information:mmartin8@uccs.edu Current Position: Instructor University of Colorado Colorado

More information

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and

More information

Georgia Department of Education Career Pathway Descriptions

Georgia Department of Education Career Pathway Descriptions Law, Public Safety, Corrections & Security Cluster Planning, managing, and providing legal, public safety, protective services and homeland security, including professional and technical support services.

More information

NASCIO 2014 State IT Recognition Awards

NASCIO 2014 State IT Recognition Awards NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Presidents Reception with Vendors 6:00pm 8:00pm EXHIBIT HALL C

Presidents Reception with Vendors 6:00pm 8:00pm EXHIBIT HALL C WESTERN STATES SHERIFF S ASSOCIATION ANNUAL CONFERNECE AND BUSNESS MEETING 2014 CONFERENCE AGENDA Sunday, February 16 TH, Afternoon Meetings. Executive Board Meeting 3:00pm 4:30pm Committee Meetings 4:30pm

More information

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS THE TEAM William Beer São Paulo William Beer brings over 25 years of diverse international consulting experience advising on and managing

More information

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS 1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase

More information

IACLEA SPOTLIGHT SAN DIEGO COMMUNITY COLLEGE DISTRICT POLICE DEPARTMENT

IACLEA SPOTLIGHT SAN DIEGO COMMUNITY COLLEGE DISTRICT POLICE DEPARTMENT Name of Agency: San Diego Community College District Police Department Name of Chief / Director: Chief Charlie Hogquist Name / email for Point of Contact: Public College, Sworn Armed (39) Unarmed (18)

More information

South Dakota Department of Public Safety Office of Homeland Security Senior Advisory Committee Charter

South Dakota Department of Public Safety Office of Homeland Security Senior Advisory Committee Charter 1. Official Designation: South Dakota Department of Public Safety Office of Homeland Security Senior Advisory Committee Charter Homeland Security Senior Advisory Committee (HSSAC) 2. Authority: The South

More information

Gila County Superior Court Judge Bryan B. Chambers

Gila County Superior Court Judge Bryan B. Chambers Gila County Superior Court Judge Bryan B. Chambers Judge Bryan B. Chambers On July 13, 2015, Bryan B. Chambers was appointed by Arizona Governor, Douglas A. Ducey, to fill the unexpired term of Judge Peter

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

JAMES R. SWAUGER Digital Forensic Examiner

JAMES R. SWAUGER Digital Forensic Examiner CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 726 East Main Street, Suite F #150 Lebanon, Ohio 45036 Phone: 866.246.2794 x703 Email: jswauger@binaryintel.com CERTIFICATIONS

More information

Douglas M. DePeppe Cyberlaw Attorney

Douglas M. DePeppe Cyberlaw Attorney Douglas M. DePeppe Cyberlaw Attorney doug@aspireip.com Cyber Risk Services Cyber Space Cyber Law International Cyber Frameworks IP Litigation George Washington University Law School, LL.M. The Judge Advocate

More information

ACADEMIC VITA. JAMES G. LARSON Professor Chair, Department of Professional Studies School of Professional Studies National University

ACADEMIC VITA. JAMES G. LARSON Professor Chair, Department of Professional Studies School of Professional Studies National University ACADEMIC VITA JAMES G. LARSON Professor Chair, Department of Professional Studies School of Professional Studies National University EDUCATION: 1995 Juris Doctor Thomas Jefferson School of Law 1987 Bachelor

More information

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning

More information

REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO

REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO CERTIFICATE NUMBER (FOR COMPTROLLER S USE ONLY) TO: CITY COUNCIL FROM (ORIGINATING DEPARTMENT): Police Department DATE: 5/26/2015 SUBJECT: Informational update

More information

TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE

TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August

More information

Disaster Recovery Workshop

Disaster Recovery Workshop Disaster Recovery Workshop Date: March 30, 2006 Location: Milton Marks Conference Center San Diego Room B/C 455 Golden Gate Avenue (Lower Level) San Francisco, CA 94102 Parking: There is an existing underground

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES. Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive

More information

CHATHAM COUNTY DEPARTMENT OF FAMILY AND CHILDREN S SERVICES

CHATHAM COUNTY DEPARTMENT OF FAMILY AND CHILDREN S SERVICES Georgia s Statewide Family Drug Treatment Court Training CHATHAM COUNTY DEPARTMENT OF FAMILY AND CHILDREN S SERVICES 761 Wheaton Street Savannah, Georgia 31498-1301 (912) 651-2216 February 8-9, 2012 This

More information

Homeland Security Major

Homeland Security Major Homeland Security Major Zach Wexman, Onye Chi-ukpai, Daniel Rapcsak, John Jackson Prior to the attacks of 9/11, a degree in Homeland Security was non-existent. The U.S. isn t only vulnerable to political

More information

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security. Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency

More information

Security Management Program Development:

Security Management Program Development: Security Management Program Development: A Critical Infrastructure Protection Model July 15 16, 2015 Earn up to 15 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are

More information

Safeguarding Elders & Dependent Adults. Against Abuse FIRST CONFERENCE IN SANTA MARIA. How Our Community Works to Prevent Elder Abuse

Safeguarding Elders & Dependent Adults. Against Abuse FIRST CONFERENCE IN SANTA MARIA. How Our Community Works to Prevent Elder Abuse Safeguarding Elders & Dependent Adults Against Abuse FIRST CONFERENCE IN SANTA MARIA How Our Community Works to Prevent Elder Abuse Friday, August 26, 2011 8:30 a.m. Noon. Elwin Mussell Senior Center 510

More information

SAMPLE COURSE SYLLABUS*

SAMPLE COURSE SYLLABUS* DSS CENTER FOR DEVELOPMENT OF SECURITY EXCELLENCE (CDSE) EDUCATION DIVISION Managing a DoD Installation Security Program ED 507 SAMPLE COURSE SYLLABUS* A. DESCRIPTION The 2007 Defense Installations Plan

More information

Yolo County District Attorney s Citizens Academy

Yolo County District Attorney s Citizens Academy COUNTY OF YOLO OFFICE OF THE DISTRICT ATTORNEY JEFF W. REISIG, DISTRICT ATTORNEY Yolo County District Attorney s Citizens Academy Summary of Classes In partnership with Yolo County Sheriff s Office California

More information

PROGRAMS STUDY. Information Technology

PROGRAMS STUDY. Information Technology PROGRAMS STUDY of COMPUTER INFORMATION SYSTEMS 011 Associate in Applied Science degree (A.A.S.) 60 Credit Hours (CH) The study of basic business and technical principles used in programming and operating

More information

STATE OF MARYLAND Strategy for Homeland Security

STATE OF MARYLAND Strategy for Homeland Security STATE OF MARYLAND Strategy for Homeland Security Published June 2004 Governor s Office of Homeland Security Dennis R. Schrader, Director Robert L. Ehrlich, Jr. Governor Michael S. Steele Lt. Governor HOMELAND

More information

Gregg Gerber. Strategic Engagement, Emerging Markets

Gregg Gerber. Strategic Engagement, Emerging Markets Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005

More information

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17 PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17 Issued Date:01-29-15 Effective Date:01-29-15 Updated Date: SUBJECT: DELAWARE VALLEY INTELLIGENCE CENTER UNIT 1. BACKGROUND A. The Delaware Valley Intelligence

More information

2013 HOMELAND SECURITY SYMPOSIUM

2013 HOMELAND SECURITY SYMPOSIUM PROMOTING NATIONAL SECURITY SINCE 1919 2013 HOMELAND SECURITY SYMPOSIUM All-Hazards Approach to Homeland Security: Mitigation, Response, Recovery, & Resilience NOVEMBER 7-8, 2013 EVENT #4490 u WASHINGTON,

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Subject: Critical Infrastructure Identification, Prioritization, and Protection For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

CRIMINAL JUSTICE. Master of Arts. Master of Science HOMELAND SECURITY. Graduate PROGRAMS

CRIMINAL JUSTICE. Master of Arts. Master of Science HOMELAND SECURITY. Graduate PROGRAMS Master of Arts CRIMINAL JUSTICE Master of Science HOMELAND SECURITY Graduate PROGRAMS M onmouth University s Criminal Justice and Homeland Security graduate programs are designed to provide students with

More information

INTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS

INTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS INTERNET GOVERNANCE AND ENFORCEMENT OF INTELLECTUAL PROPERTY RIGHTS - Administrative, Civil and Criminal Challenges 5-7 February 2014, Danilovgrad (Montenegro) PROVISIONAL PROGRAMME Background In the Balkan

More information

District Attorney. FY 14/15 FY 15/16 Adopted CAO 108-2500 Budget Recommended Change

District Attorney. FY 14/15 FY 15/16 Adopted CAO 108-2500 Budget Recommended Change FY 14/15 FY 15/16 Adopted CAO 108-2500 Budget Recommended Change EXPENDITURES Salaries and Benefits 1,875,818 1,911,198 35,380 Services and Supplies 94,213 84,634 (9,579) Other Charges 207,072 141,406

More information

Cybersecurity Training

Cybersecurity Training Cybersecurity Training Cook County Department of Homeland Security and Emergency Management (DHSEM), in partnership with Texas A&M Engineering Extension Service (TEEX), is pleased to announce the below

More information

Subj: NAVAL POSTGRADUATE SCHOOL MISSION AND FUNCTIONS

Subj: NAVAL POSTGRADUATE SCHOOL MISSION AND FUNCTIONS DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 5450.210D NPS OPNAV INSTRUCTION 5450.210D From: Chief of Naval Operations Subj: NAVAL

More information

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

December 17, 2003 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate

More information

A Statewide Training Conference Agenda DOMESTIC VIOLENCE - Ending Violence: Assessing Victim Safety and Addressing Victims Needs

A Statewide Training Conference Agenda DOMESTIC VIOLENCE - Ending Violence: Assessing Victim Safety and Addressing Victims Needs A Statewide Training Conference Agenda DOMESTIC VIOLENCE - Ending Violence: Assessing Victim Safety and Addressing Victims Needs Sponsored by United States Attorneys for the Eastern, Middle, and Western

More information

Health Approaches in Community-Level Strategies to Countering Violent Extremism and Radicalization: A Workshop

Health Approaches in Community-Level Strategies to Countering Violent Extremism and Radicalization: A Workshop Forum on Medical and Public Health Preparedness for Catastrophic Events Health Approaches in Community-Level Strategies to Countering Violent Extremism and Radicalization: A Workshop September 7-8, 2016

More information

Emergency Response Symposium 2016: Regional Response to Terror

Emergency Response Symposium 2016: Regional Response to Terror Emergency Response Symposium 2016: Regional Response to Terror Presented by the Maryland-National Capital Region Emergency Response System Thursday, May 26, 2016 9:00 AM-4:00 PM Marriott College Park Conference

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

DHS, National Cyber Security Division Overview

DHS, National Cyber Security Division Overview DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined

More information

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral

More information

2014 Montana Government IT Conference. Securing Data Networks and People

2014 Montana Government IT Conference. Securing Data Networks and People Presenter: Matt Bennett, Genetec Leveraging the Cloud for Hybrid Video Surveillance Matt is based in Seattle, WA and is the Western North America pre-sales engineer for Genetec (the world s leader in unified

More information

Business Continuity for Cyber Threat

Business Continuity for Cyber Threat Business Continuity for Cyber Threat April 1, 2014 Workshop Session #3 3:00 5:30 PM Susan Rogers, MBCP, MBCI Cyberwise CP S2 What happens when a computer program can activate physical machinery? Between

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

v. 03/03/2015 Page ii

v. 03/03/2015 Page ii The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course

More information

Campus Security Guidelines. Recommended Operational Policies for Local and Campus Law Enforcement Agencies

Campus Security Guidelines. Recommended Operational Policies for Local and Campus Law Enforcement Agencies Campus Security Guidelines Recommended Operational Policies for Local and Campus Law Enforcement Agencies A project of William J. Bratton, Chief of Police, Los Angeles President, Major Cities Chiefs Association

More information

75 South Ivanhoe Boulevard P.O. Box 1234 Orlando, FL 32802 Phone: 407.425.1234

75 South Ivanhoe Boulevard P.O. Box 1234 Orlando, FL 32802 Phone: 407.425.1234 Carol Craig Founder and CEO Craig Technologies 8550 Astronaut Boulevard Cape Canaveral, FL 32920 Phone: 321.613.5620 ext. 231 Email: carol.craig@craigtechinc.com Twitter: @ChumCraig @CraigTechInc A self-described

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

NIMS ICS 100.HCb. Instructions

NIMS ICS 100.HCb. Instructions NIMS ICS 100.HCb Instructions This packet contains the NIMS 100 Study Guide and the Test Questions for the NIMS 100 final exam. Please review the Study Guide. Next, take the paper test - record your answers

More information

Promoting Best Practices for Prosecuting Violence Against Women Crimes

Promoting Best Practices for Prosecuting Violence Against Women Crimes Promoting Best Practices for Prosecuting Violence Against Women Crimes March 25, 20ll Embassy Suites Montgomery, Alabama Sponsored by Office of Prosecution Services Alabama District Attorneys Association

More information

CYBER RISK INTERNATIONAL COMPANY PROFILE

CYBER RISK INTERNATIONAL COMPANY PROFILE CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.

More information

National Institute of Justice

National Institute of Justice U.S. Department of Justice Office of Justice Programs National Institute of Justice National Institute of Justice R e s e a r c h i n B r i e f Julie E. Samuels, Acting Director August 2000 Issues and

More information

Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down

Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down Program Organizer: Please join us for a NEW Invitation Only Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down Role of Firm Leadership, IT, COO, General Counsel Data Breaches Identification

More information

Bank Secrecy Act Conference

Bank Secrecy Act Conference 2014 Bank Secrecy Act Conference Sponsored by: AGENDA 9:00 a.m. - 10:00 a.m. 10:15 a.m. - 11:45 a.m. 11:45 a.m. - 1:15 p.m. 1:15 p.m. - 2:15 p.m. 2:30 p.m. - 3:30 p.m. 3:45 p.m. - 4:45 p.m. Thursday, June

More information

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015 An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit

More information

It s about service. to clients to colleagues to community to country

It s about service. to clients to colleagues to community to country It s about service It s about service to clients to colleagues to community to country Delivering business strategy and mission-critical IT solutions and services for nearly two decades. 1 Source is a

More information

B E F O R E T H E E M E R G E N C Y

B E F O R E T H E E M E R G E N C Y B E F O R E T H E E M E R G E N C Y RESPONSIBILITY / LIABILITY for Homeland Security / Emergency Management Duty of Care - Counties and Cities ARE responsible for the safety of their citizens. Following

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department

More information