Homeland Security Research

Size: px
Start display at page:

Download "Homeland Security Research"

Transcription

1 Homeland Security Research at The State University of New York Cyber Security Biodefense Infrastructure Protection & Sensors Intelligence Analysis Education & Training The State University of New York (SUNY), the nation s largest comprehensive system of public higher education, is directing its combined strength and unique resources to address major homeland security challenges facing the United States. The State University of New York

2 CYBER SECURITY Homeland Security Research at the State University of New York WHO WE ARE The State University of New York (SUNY) is the nation s largest comprehensive system of public higher education. Its 64 unique institutions offer more than 7,669 fields of study to over 412,000 students. SUNY conducts nearly $900 million in sponsored research annually and ranks in the top 15 U.S institutions in patents issued each year. WHAT WE ARE DOING SUNY, with its cutting edge research, state-of-the-art facilities and strategic partnerships, is enhancing the nation s ability to prepare for, deter, and, if necessary, respond to a host of security threats. Collaborating with academic, government and industry partners, SUNY faculty work on new, inventive approaches to cyber security, biodefense, infrastructure protection, sensor technologies, and education and training. CYBER SECURITY The State University of New York has top-flight facilities, including the Center for Computational Research at the University at Buffalo one of the top 10 academic super computer facilities in the U.S., for advanced research on all facets of information assurance and global computer/communication networks. Cyber attack and recognition systems Creating a system that generates profiles of network users to provide protection for military installations and government agencies. Computer network forensics Methods to identify infected machines, sources of attacks and other anomalies. Detecting computer system vulnerabilities Developing techniques and tools to identify and monitor weaknesses in computer systems that can be exploited to compromise system security. Contact: Lynn Videka, Ph.D., SUNY Albany, , Ann-Marie Scheidt, Ph.D., SUNY Stony Brook, (631) , amscheidt@notes.cc.sunysb.edu BIODEFENSE Information assurance Ongoing study of the vulnerability of U.S. public and private information systems and infrastructure with a view to improving security and developing a workforce of information security professionals. Gerald Sonnenfeld, Ph.D., Binghamton University, Protecting networked systems Artificial immune systems and other defenses against hacker attacks. Gerald Sonnenfeld, Ph.D., Binghamton University, Risk analysis Developing models and collecting data for information security risk analysis in different organizations. Secure mobile code Developing Model-Carrying Code (MCC) to the point where it can be standardized, providing a basis for the protection of system and data integrity. Securing network file systems Exploring a layered approach to file protection to allow for security guarantees at different levels along the data path. Security software Sophisticated models of securityrelevant system behaviors to protect systems from threats including software errors and malicious intrusions. BIODEFENSE The State University of New York, with its three health science centers and extensive research capabilities in medicine, drug development and biotechnology, is bringing the best science to bear in the fight against potential terrorist attacks involving biological and disease agents. Artificial blood Developing a red blood cell substitute to counteract shock from blood loss.

3 Biosensors Exploring new sensor arrays to detect and identify almost any biological macromolecule at extremely low levels. Gerald Sonnenfeld, Ph.D., Binghamton University, Neil Ringler, Ph.D., SUNY ESF, /6609, Biotechnology manufacturing Establishing a fully integrated research and manufacturing center at the Brooklyn Army Terminal to facilitate the deployment of new biotechnology. Bioterrorism surveillance system Identifying methods to detect and monitor suspicious patterns in reported illnesses within specific geographic areas. Gene design Exploiting the redundancy inherent in the genetic code to design new vaccines. Monitoring vital functions Developing medical devices for use in primitive clinical field settings, such as the patented Hickey catheter, that can monitor blood flow and volume, cardiac pumping ability and heart valve function at a modest cost. Particulates and aerosols Applying expertise in bioaerosols, biosurface interactions and research on aerosol drug-delivery systems to understand cardiovascular and respiratory reactions to airborne contagions. Neil Ringler, Ph.D., SUNY ESF, /6609, neilringler@esf.edu Public health preparedness Providing leadership in development of regional public health preparedness systems with an emphasis on bioterrorist threats. Ken Barker, Ph.D., Upstate Medical University, ; barkerk@upstate.edu INFRASTRUCTURE AND SENSORS Vaccines and therapies Research on: - Slow-release agents that provide long-term immunity. - Direct delivery to specific sites, such as the lungs in the case of anthrax. - Incorporating adjuvant (supplementary) agents to increase immunity. Eva Cramer, Ph.D., SUNY Downstate Medical Center, , eva.cramer@downstate.edu Infrastructure Protection and Sensors The constant pursuit of scientific and engineering applications by SUNY faculty is strengthening the nation s ability to prevent, mitigate and manage high consequence disasters and terrorist attacks. Airborne contaminant mapping A numerical method to model, visualize and predict the airborne movement of contaminants in urban environments. Aviation safety Human, mechanical and information systems to improve the effectiveness and efficiency of airport security systems. Kenneth M. Tramposch, Ph.D., University at Buffalo, , tramposch@research.buffalo.edu Biometric identification systems A law enforcement system capable of automatically tracking and identifying suspects based on witness natural language description. Blast proof structures A shock-absorption system that would make buildings, bridges and infrastructure resilient to terrorist attack using explosives. Cargo screening Device to detect plastic explosives in shipping containers and truck trailers. Contact: Samuel Yahalom, Ph.D., SUNY Maritime, , syahalom@sunymaritime.edu

4 Disaster analysis Applying information fusion to improve the immediate response by assessing damage, search and rescue, sheltering and evacuation, and resource management. Electronic noses Using nano-composite metal oxides that respond to chemical vapors to sniff out harmful substances. Emergency services family support Proactive assistance to those who have had a loved one exposed to a traumatic event. Contact: Robert Delprino, Buffalo State College, , delprirp@buffalostate.edu Inventory of freshwater biotoxins Compiling a standardized reference collection of contaminants to speed identification and response to threats to drinking and recreational waters. Contact: Neil Ringler, Ph.D., SUNY ESF, / 6609, neilringler@esf.edu Pathogen destruction An air purification device that uses rapid heat to destroy airborne pathogens. Port and maritime security New technologies to track, monitor, and inspect containers and cargoes including real time wireless communications systems including: - Container fingerprinting. - Bulk cargo monitoring. - Dynamic geographic information system applications security. Contact: Samuel Yahalom, Ph.D., SUNY Maritime, , syahalom@sunymaritime.edu Response to mass casualty attacks Applying sociological analysis to mobilization and information dissemination. Search and rescue New options, including rats fitted with microelectronics, for search and rescue missions in environments that are inaccessible to dogs and traditional robots. Surveillance sensor systems Prototype for radar sensor management problems for an airborne early warning system. Transportation modeling Emergency decision support for routing traffic under crisis situations. INTELLIGENCE ANALYSIS Water supply security Real-time detection and monitoring technology to protect drinking water supplies, distribution systems, and treatment facilities against chemical and biological threats. Contact: Neil Ringler, Ph.D., SUNY ESF, / 6609, neilringler@esf.edu Wireless communications A system that combines conventional cellular technology with Ad hoc Relay Station (ARS) technology to ensure cell-phone communication is available in times of disaster. Buffalo, , tramposch@research.buffalo. INTELLIGENCE ANALYSIS The State University of New York is developing an array of high- and low-tech tools to gather and sift through terrorism intelligence and assess the nature and scope of terrorist threats. Advanced information retrieval Systems to facilitate sifting of news and field reports, enabling better comprehension of terrorist behavior and development of effective counter-terrorism measures. Digital tools for Arabic Applying optical characterrecognition (OCR) software for Arabic documents. Document analysis Handwriting recognition software that was used to track down the author of the anthrax letters. Facial recognition Exploiting the high resolution of digital cameras to create a system for biometric identification. Human alarm pheromones Chemically identifying alarm pheromones to complement behavioral and physiological fear-detection used in lie detection and security applications at airports, subways, buses and other contained areas. Identification systems Employing fingerprints, voice, iris, hand geometry, signature, face, behavioral and chemical biometric technologies for security applications. Contact: Kenneth M. Tramposch, Ph.D., University at Buffalo, , tramposch@research.buffalo.edu

5 EDUCATION & TRAINING Intelligence collection High-Quality Interactive Question Answering extracts and correlates actionable intelligence from massive volumes of data. Patterns of terrorist activity Examining spatial patterns of terrorism to understand how terrorist activity diffuses across a region. Smart dust Small microphones that can be scattered across a battlefield to detect the sounds and determine the direction of troop or equipment movements. Uncovering hidden communications Applying steganography (covert communication through pictures), and steganalysis (detection of hidden communications) to the defense of military and digital communications and the discovery of secret terrorist communications. Education and Training The State University of New York offers training sessions and courses that can be modified as needed for specific audiences, including first responders and intelligence personnel, as well as facilities for classroom instruction, computer modeling, simulations, exercises and drills. Center for Public Health Preparedness Improving the capacity of the public health workforce to respond to current and emerging threats with a focus on bioterrorism and infectious disease outbreaks Disaster preparedness Providing training and EMS education aimed at a wide variety of health care providers including strategic management and medical simulation exercises and evaluation. Contact: Ken Barker, Ph.D., Upstate Medical University, ; barkerk@upstate.edu Disaster response Providing a hospital-affiliated preparedness and training facility at the Brooklyn Army Terminal to develop coordinated strategies to anticipate and react to chemical, biological, radiological, nuclear, and explosive (CBRNE) threats. Emergency eye care Teaching urban emergency personnel sight saving first aid for particulate, chemical and biological agents associated with terrorist attacks. Contact: Jerry Feldman, Ph.D., SUNY Optometry, , jfeldman@sunyopt.edu First responder training Providing courses and advanced, equipped space in which to train local and regional public safety personnel. Contact: John Perrone, Monroe Community College, ; jperrone@monroecc.edu Richard F. Gorko, Niagara County Community College, Ext.16, gorko@niagaracc.suny.edu Edward S. Baker, Schenectady County Community College, , bakeres@gw.sunysccc.edu Anthony Palmiotti, SUNY Maritime, , apalmiotti@sunymaritime.edu Geospatial information technology Global Positioning System (GPS) training for state and local law enforcement; enhanced Geographic Information Systems (GIS) image processing for local law enforcement. Contact: Greg Truckenmiller, Ph.D., Fulton-Montgomery Community College, Ext. 8003, gtrucken@fmcc.suny.edu Homeland security Providing information about operational, tactical and strategic elements of homeland security as well as studies of legal issues and methods of domestic preparedness, including at the local government and school level. Contact: Barry Garigen, Genesee Community College, Ext. 6307, bjgarigen@genesee.edu John Perrone, Monroe Community College, ; jperrone@monroecc.edu Richard F. Gorko, Niagara County Community College, Ext.16, gorko@niagaracc.suny.edu Edward S. Baker, Schenectady County Community College, , bakeres@gw.sunysccc.edu Lynn Videka, Interim Vice President for Research, SUNY Albany, , lvideka@uamail.albany.edu National Center for Geographic Information Analysis (NCGIA) Providing facilities that can rapidly detect patterns of incidents such as terrorist acts and develop and test immersive and virtual reality spaces for access by intelligence personnel. Northeast Regional Forensics Institute Providing advanced forensic training facilities to educate students in current industry standards and procedures, conduct research and validate new techniques.

6 SUNY CAPABILITIES AND RESOURCES A COMPREHENSIVE SYSTEM The State University of New York includes: Four premier research-intensive University Centers University at Albany, Binghamton University, University at Buffalo and Stony Brook University that offer a broad array of nationally and internationally ranked programs and specializations. Three Health Science Centers, located in Brooklyn, Stony Brook and Syracuse, that have demonstrated expertise in providing emergency preparedness and response on a daily basis through clinical service, education and research. Four unique institutions - College of Environmental Science & Forestry is one of few colleges in the United States that focuses on natural resources and the environment. - Maritime College is home to the Port and Maritime Security Center providing research and development and undergraduate and graduate courses in maritime security. - College of Optometry is widely recognized for scientific eminence and leadership in the provision of eye care. - The Neil D. Levin Graduate Institute of International Relations and Commerce integrates international relations and commerce curricula with ethics and culture training to prepare students to succeed in an ever-changing global environment. 30 community colleges that provide local centers of educational opportunity across New York state. WORLD CLASS FACULTY SUNY s 30,000 faculty have won awards including the Nobel Prize, Fields Medal, Dirac Medal, the National Medal of Science and the National Medal of Technology. They have pioneered nuclear magnetic resonance imaging, introduced time-lapse photography of forestry subjects, isolated the bacteria that causes Lyme disease, and developed the first implantable heart pacemaker. PARTNERSHIPS The Research Foundation of State University of New York and Battelle Memorial Institute operate the Brookhaven National Laboratory 1 of 10 national laboratories under the U.S. Department of Energy. SUNY is home to three New York State Centers of Excellence. With a focus on critical, emerging technologies, each one of these public-private partnerships advances applied research and the commercialization of new products, many of which support homeland security and national defense initiatives. - The Center of Excellence in Bioinformatics and Life Sciences at the University at Buffalo is taking the genetic information provided through the Human Genome Project to understand the basic mechanisms of disease, paving the way for defense against bio-weapons. Contact: Bruce A. Holm, M.D., (716) , baholm@buffalo.edu - The Center of Excellence in Nanoelectronics located at the University at Albany is a fully-integrated technology development and deployment, product prototyping, manufacturing support, and workforce training resource for the nanotechnology and nanoelectronics industries. Contact: Alain E. Kaloyeros, Ph.D., , akaloyeros@uamail.albany.edu - The Center of Excellence in Wireless and Information Technology brings together Stony Brook University and three of the world s leading information technology companies, Computer Associates International, Inc., IBM, and Symbol Technologies, Inc., to create information technology for the wireless world of the 21st century. Contact: Yacov Shamash, Ph.D., , yacov.shamash@stonybrook.edu THE RESEARCH FOUNDATION OF STATE UNIVERSITY OF NEW YORK The Research Foundation is an essential partner of the State University of New York because it is the vehicle for receiving and managing grants for sponsored research at SUNY. It provides independence and administrative flexibility to respond quickly to the special demands of sponsored programs and forge university-industry-government partnerships that are not easily accommodated through state processes. In FY 2005, the Research Foundation managed over $735 million in grants and contracts in support of more than 8,200 campus based research and training programs. Support for these projects comes from the National Institutes of Health, the National Science Foundation, NASA, the Department of Defense, the Department of Energy, private industry and almost every federal, state and philanthropic supporter of advanced research. THE SUNY ADVANTAGE SUNY s comprehensive pool of intellectual and physical resources and complete suite of programs and services are being brought to bear on the complex challenge of homeland security. Produced by the Research Foundation of State University of New York.

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

Mass Gatherings Medical Strategies for Weapons of Mass Destruction

Mass Gatherings Medical Strategies for Weapons of Mass Destruction Mass Gatherings Medical Strategies for Weapons of Mass Destruction Kristi L. Koenig, MD, FACEP Professor of Clinical Emergency Medicine Director of Public Health Preparedness Co-Director, EMS and Disaster

More information

Ohio Homeland Security Strategic Plan 2013-2016

Ohio Homeland Security Strategic Plan 2013-2016 GOAL 1 Strengthen Ohio s intelligence and information sharing system for the detection and prevention of threats to public safety. Objective 1.1 Support continued development of the information sharing

More information

Data Security Concerns for the Electric Grid

Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES Northern Border Activities B-1 July 2012 CBP MISSION We are the guardians of our Nation s borders. We are America s frontline.

More information

The znose, A New Electronic Nose Technology For Homeland Security

The znose, A New Electronic Nose Technology For Homeland Security The znose, A New Electronic Nose Technology For Homeland Security Edward J. Staples Electronic Sensor Technology, Inc. 1077 Business Center Circle, Newbury Park, CA Tele: (805)480-1994, FAX (805)480-1984

More information

State of Ohio Homeland Security STRATEGIC PLAN

State of Ohio Homeland Security STRATEGIC PLAN State of Ohio Homeland Security 2011 Contents Introduction... 1 Mission Areas... 2 Goals... 3 Appendix A. Roundtable Advisory Committees... 14 Appendix B. Homeland Security Advisory Council... 17 Appendix

More information

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Subject: Critical Infrastructure Identification, Prioritization, and Protection For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

December 17, 2003 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

Atlantic County Public Health Emergency Preparedness Task Force

Atlantic County Public Health Emergency Preparedness Task Force Public Health Emergency Preparedness Task Force Atlantic County Interim Bioterrorism & Public Health Emergency Plan March 2003 A Proactive Approach to Prepare for Emergencies In October 2001, Atlantic

More information

Preparedness in the Southwest

Preparedness in the Southwest Preparedness in the Southwest Risk Assessment and Hazard Vulnerability Developed by The Arizona Center for Public Health Preparedness Cover Art www.azcphp.publichealth.arizona.edu Chapter 1 Importance

More information

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist

More information

v. 03/03/2015 Page ii

v. 03/03/2015 Page ii The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course

More information

HOMELAND SECURITY INTERNET SOURCES

HOMELAND SECURITY INTERNET SOURCES I&S Internet Sources I&S HOMELAND SECURITY INTERNET SOURCES USEFUL SITES, PORTALS AND FORUMS Homeland Security Home Page http://www.whitehouse.gov/homeland/ A federal agency whose primary mission is to

More information

Hospital Emergency Operations Plan

Hospital Emergency Operations Plan Hospital Emergency Operations Plan I-1 Emergency Management Plan I PURPOSE The mission of University Hospital of Brooklyn (UHB) is to improve the health of the people of Kings County by providing cost-effective,

More information

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary

More information

Department of Homeland Security Office for Domestic Preparedness. Campus Preparedness Assessment Process

Department of Homeland Security Office for Domestic Preparedness. Campus Preparedness Assessment Process Department of Homeland Security Office for Domestic Preparedness Campus Preparedness Assessment Process Campus Preparedness Assessment-Overview Purpose of the CPA Elements of the CPA How to use the CPA

More information

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies

More information

Ahead of the Curve with Intelligent. Transportation

Ahead of the Curve with Intelligent. Transportation Ahead of the Curve with Intelligent Transportation Advanced technologies to ensure the safe, efficient, and secure movement of passengers and freight. Intelligent transportation is changing the way America

More information

Assessment Profile: Establishing Curricular Categories for Homeland Security Education

Assessment Profile: Establishing Curricular Categories for Homeland Security Education Assessment Profile: Establishing Curricular Categories for Homeland Security Education During any examination or assessment of the subject, homeland security, it becomes quite evident that by the definition(s)

More information

Establishing A Secure & Resilient Water Sector. Overview. Legislative Drivers

Establishing A Secure & Resilient Water Sector. Overview. Legislative Drivers Establishing A Secure & Resilient Water Sector December 14-15, 2010 LWQTC Overview Key Drivers Legislation Presidential Directives AWWA & Sector Initiatives Standards & Guidance Mutual Aid & Assistance

More information

Homeland Security Graduate Programs

Homeland Security Graduate Programs Homeland Security Graduate Programs TABLE OF CONTENTS Homeland Security Portfolio...3 Homeland Security Master s Degree Base Program and Graduate Certificate... 4 5 Public Health Preparedness... 6 7 Geospatial

More information

The Strategic Importance, Causes and Consequences of Terrorism

The Strategic Importance, Causes and Consequences of Terrorism The Strategic Importance, Causes and Consequences of Terrorism How Terrorism Research Can Inform Policy Responses Todd Stewart, Ph.D. Major General, United States Air Force (Retired) Director, Program

More information

Algorithmic Decision Theory and Smart Cities. Fred Roberts Rutgers University

Algorithmic Decision Theory and Smart Cities. Fred Roberts Rutgers University Algorithmic Decision Theory and Smart Cities Fred Roberts Rutgers University 1 Algorithmic Decision Theory Today s decision makers in fields ranging from engineering to medicine to homeland security have

More information

National Capital Region: Urban Area Security Initiatives Grants Subgrants as of 01/31/14

National Capital Region: Urban Area Security Initiatives Grants Subgrants as of 01/31/14 National Capital Region: Urban Area Initiatives Grants Subgrants as of 01/31/14 Year Subgrantee Subgrant Name Award All Hazards Consortium HSEMA Performance and Professional Development Initiative (DC

More information

U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District

U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District Securing the Nation s s critical infrastructures one community at a time Critical Infrastructure & Key Resources

More information

Project Management Plan

Project Management Plan Project Management Plan FY 2009 UASI Project Information Project Title Subgrantee Subgrant GIS Data Exchange District of Columbia [to be generated by SAA] Subgrant Award $600,000.00 Jurisdiction (if applicable)

More information

National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee

National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword

More information

How To Set Up A National Biological Laboratory Safety And Security Monitoring Program

How To Set Up A National Biological Laboratory Safety And Security Monitoring Program Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science Volume 10, Number 4, 2012 ª Mary Ann Liebert, Inc. DOI: 10.1089/bsp.2012.0054 Establishing a National Biological Laboratory Safety

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

GCC Homeland Security in a New Order. Dr. Theodore Karasik Director of Research and Consultancy INEGMA. September 2013

GCC Homeland Security in a New Order. Dr. Theodore Karasik Director of Research and Consultancy INEGMA. September 2013 GCC Homeland Security in a New Order Dr. Theodore Karasik Director of Research and Consultancy INEGMA September 2013 Secular Sectarian Tribal State Actors Regional Shifts and Threats in the New Order A

More information

Cyber Security Research and Development: A Homeland Security Perspective

Cyber Security Research and Development: A Homeland Security Perspective Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders

More information

April 12, 2007. Call-In Phone: 800-452-0662. From Teachers to Leaders In Crisis. Fax: 518-426-0696. Email: cphp@uamail.albany.edu.

April 12, 2007. Call-In Phone: 800-452-0662. From Teachers to Leaders In Crisis. Fax: 518-426-0696. Email: cphp@uamail.albany.edu. University at Albany Center for Public Health Preparedness Grand Rounds Series April 12, 2007 Roseann Samson, Ed.D Assistant Superintendent Port Charlotte - Punta Gorda - Englewood April 12, 2007 From

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

STATE OF MARYLAND Strategy for Homeland Security

STATE OF MARYLAND Strategy for Homeland Security STATE OF MARYLAND Strategy for Homeland Security Published June 2004 Governor s Office of Homeland Security Dennis R. Schrader, Director Robert L. Ehrlich, Jr. Governor Michael S. Steele Lt. Governor HOMELAND

More information

Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany.

Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany. Security systems URBAN SECURITY Information systems protecting major cities with a main goal: to guarantee citizen s well being indracompany.com isafety Urban Security Supports and strengthens coordination

More information

ANNEX 3 ESF-3 - PUBLIC WORKS AND ENGINEERING. SC Budget and Control Board, Division of Procurement Services, Materials Management Office

ANNEX 3 ESF-3 - PUBLIC WORKS AND ENGINEERING. SC Budget and Control Board, Division of Procurement Services, Materials Management Office ANNEX 3 ESF-3 - PUBLIC WORKS AND ENGINEERING PRIMARY: SUPPORT: SC Budget and Control Board, Division of Procurement Services, Materials Management Office Clemson University Regulatory and Public Service

More information

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government

More information

HOMELAND SECURITY MARKET DEVELOPMENT IN ILLINOIS

HOMELAND SECURITY MARKET DEVELOPMENT IN ILLINOIS HOMELAND SECURITY MARKET DEVELOPMENT IN ILLINOIS The Role of Community Colleges in Workforce Education ICCB Homeland Security Conference 2/21/2007 Present by: Michael Brody, Assistant Deputy Director The

More information

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland

More information

The Telemedicine Response to Homeland Safety and Security Developing a National Network for Rapid and Effective Response for Emergency Medical Care

The Telemedicine Response to Homeland Safety and Security Developing a National Network for Rapid and Effective Response for Emergency Medical Care The Telemedicine Response to Homeland Safety and Security Developing a National Network for Rapid and Effective Response for Emergency Medical Care The unprecedented and growing threats to the safety and

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

School of Public Health Task Force Report Executive Summary

School of Public Health Task Force Report Executive Summary School of Public Health Task Force Report Executive Summary The charge for the task force was: To explore the mechanism for creation of a School of Public Health at VCU. To create a long-term plan for

More information

Faculdade de Direito, Lisboa, 02-Jul-2014. The Competitive Advantage of Cybersecurity

Faculdade de Direito, Lisboa, 02-Jul-2014. The Competitive Advantage of Cybersecurity Faculdade de Direito, Lisboa, 02-Jul-2014 The Competitive Advantage of Cybersecurity Thales Key highlights (I) A global company with 65,000 employees and 14,2 billion in revenues, R&D 2,5 billion * We

More information

New York State Resources for Entrepreneurial Companies

New York State Resources for Entrepreneurial Companies New York State Resources for Entrepreneurial Companies 1. NYSTAR Innovation Resources in NYS 2. Other NYS-Based Federal and State Funding Opportunities 1. Innovation Resources in NYS NYS Division of Science,

More information

Port of Long Beach 1249 Pier F Avenue Long Beach, CA 90802 (562) 283-7814

Port of Long Beach 1249 Pier F Avenue Long Beach, CA 90802 (562) 283-7814 The Written Statement of Randy Parsons Director of Security Services Port of Long Beach Before the House Committee on Homeland Security Subcommittee on Border and Maritime Security United States Congress

More information

Tracking Track anything from relatively simplistic commercial GPS-enabled cell phones to complex military grade GPS signals.

Tracking Track anything from relatively simplistic commercial GPS-enabled cell phones to complex military grade GPS signals. HazNet has been developed specifically to reduce the risk and attendant costs of moving and managing Hazardous Materials. The key to the efficiency of this system was the integration of IRRIS. IRRIS developed

More information

A BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper

A BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper A BUSINESS CASE FOR BEHAVIORAL ANALYTICS White Paper Introduction What is Behavioral 1 In a world in which web applications and websites are becoming ever more diverse and complicated, running them effectively

More information

Homeland Security Presidential Directive/HSPD-9 Subject: Defense of United States Agriculture and Food January 30, 2004

Homeland Security Presidential Directive/HSPD-9 Subject: Defense of United States Agriculture and Food January 30, 2004 For Immediate Release Office of the Press Secretary February 3, 2004 Homeland Security Presidential Directive/HSPD-9 Subject: Defense of United States Agriculture and Food January 30, 2004 Purpose (1)

More information

Jay Grant AAPA Federal Lobbyist Director, Port Security Council

Jay Grant AAPA Federal Lobbyist Director, Port Security Council AAPA Security & Safety Seminar Jay Grant AAPA Federal Lobbyist Director, Port Security Council July 28, 2005 Port Security Council A legislative coalition established to serve as a single voice for the

More information

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports 2005 SRI International SRI International Company Proprietary Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports Presented to: 10 th Annual Harbor Safety

More information

Introduction. Catastrophic Incident Annex. Cooperating Agencies: Coordinating Agency: Department of Homeland Security

Introduction. Catastrophic Incident Annex. Cooperating Agencies: Coordinating Agency: Department of Homeland Security Catastrophic Incident Annex Coordinating Agency: Department of Homeland Security Cooperating Agencies: All Federal departments and agencies (and other organizations) with assigned primary or supporting

More information

TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE

TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August

More information

Security Systems EMERGENCY MANAGEMENT. In security you cannot choose the second best option. indracompany.com

Security Systems EMERGENCY MANAGEMENT. In security you cannot choose the second best option. indracompany.com Security Systems EMERGENCY MANAGEMENT In security you cannot choose the second best option indracompany.com EMERGENCY MANAGEMENT EMERGENCY MANAGEMENT EMERGENCY C4i CENTRE Crisis management and preparednesss

More information

CYBER SECURITY GUIDANCE

CYBER SECURITY GUIDANCE CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires

More information

National and Transnational Security Implications of Big Data in the Life Sciences

National and Transnational Security Implications of Big Data in the Life Sciences Prepared by the American Association for the Advancement of Science in conjunction with the Federal Bureau of Investigation and the United Nations Interregional Crime and Justice Research Institute National

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

STATE HOMELAND SECURITY GRANT PROGRAM

STATE HOMELAND SECURITY GRANT PROGRAM FY2015 State Homeland Security Investment Justifications STATE HOMELAND SECURITY GRANT PROGRAM OREGON OFFICE OF EMERGENCY MANAGEMENT www.oregon.gov/omd/oem Mailing address: P.O. Box 14370 Salem, OR 97309-5062

More information

Surveillance and Security Technologies for Bridges and Tunnels

Surveillance and Security Technologies for Bridges and Tunnels Surveillance and Security Technologies for Bridges and Tunnels Sheila Rimal Duwadi, P.E., Team Leader Bridge Safety, Reliability and Security, Federal Highway Administration, 6300 Georgetown Pike, McLean

More information

DIVISION OF HOMELAND SECURITY AND EMERGENCY SERVICES

DIVISION OF HOMELAND SECURITY AND EMERGENCY SERVICES MISSION DIVISION OF HOMELAND SECURITY AND EMERGENCY SERVICES The Division of Homeland Security and Emergency Services (DHSES) was established in July 2010 through the merger of four existing entities:

More information

National Domestic Preparedness Consortium. Preparing the Nation through Training

National Domestic Preparedness Consortium. Preparing the Nation through Training National Domestic Preparedness Consortium Preparing the Nation through Training NDPC Mission Statement To enhance the preparedness of territories, state, local, and tribal emergency responders/first receivers

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

Bioterrorism & Emergency Readiness

Bioterrorism & Emergency Readiness Bioterrorism & Emergency Readiness COMPETENCIES FOR ALL PUBLIC HEALTH WORKERS A Message from the Centers for Disease Control and Prevention Dear Public Health Colleague, A prepared workforce is an essential

More information

Delaware s Transportation Management Program

Delaware s Transportation Management Program Delaware s Transportation Management Program Operations Incident and Event Management Homeland Security Delaware Department of Transportation Transportation Management Center DelTrac is the Delaware Department

More information

An ESRI White Paper May 2007 GIS Supporting the Homeland Security Mission

An ESRI White Paper May 2007 GIS Supporting the Homeland Security Mission An ESRI White Paper May 2007 GIS Supporting the Homeland Security Mission ESRI 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright

More information

DEPARTMENT OF HOMELAND SECURITY

DEPARTMENT OF HOMELAND SECURITY DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $43.2 billion, an increase of $309 million above the 2010 enacted level. Increases were made in core homeland security functions such as border

More information

North Carolina Emergency Management

North Carolina Emergency Management North Carolina Emergency Management North Carolina Incidents North Carolina Incidents Primary mission is consequence management Must be prepared to: Search and Rescue Provide Mass Care Protect Life and

More information

Arizona Crisis Standards of Care Tabletop Exercise

Arizona Crisis Standards of Care Tabletop Exercise Arizona Crisis Standards of Care Tabletop Exercise Situation Manual May 19, 2015 This Situation Manual was supported in part by the CDC Cooperative Agreement, Catalog of Federal Domestic Assistance (CFDA)

More information

Frances B. Phillips, RN, MHA Health Officer Anne Arundel County Department of Health Annapolis, Maryland

Frances B. Phillips, RN, MHA Health Officer Anne Arundel County Department of Health Annapolis, Maryland Statement of Frances B. Phillips, RN, MHA Health Officer Anne Arundel County Department of Health Annapolis, Maryland On behalf of the National Association of County and City Health Officials Before the

More information

HIGHER EDUCATION AND THE NEW VIRGINIA ECONOMY: MASON LEADS THE WAY

HIGHER EDUCATION AND THE NEW VIRGINIA ECONOMY: MASON LEADS THE WAY HIGHER EDUCATION AND THE NEW VIRGINIA ECONOMY: MASON LEADS THE WAY Ángel Cabrera, President George Mason University NAIOP Northern Virginia December 9, 2015 George Mason University is Virginia s largest

More information

Addendum to the Epi-Aid Trip Report: Elk River Chemical Spill, West Virginia, January 16 31, 2014 (Epi-Aid 2014-023)

Addendum to the Epi-Aid Trip Report: Elk River Chemical Spill, West Virginia, January 16 31, 2014 (Epi-Aid 2014-023) Date: August 18, 2014 From: Mary Anne Duncan, DVM, MPH, Epidemiologist and Assessment of Chemical Exposures (ACE) Program Coordinator, Division of Toxicology and Human Health Sciences, Agency for Toxic

More information

Introduction to Public Health: Explaining Its Role in Disasters

Introduction to Public Health: Explaining Its Role in Disasters Introduction to Public Health: Explaining Its Role in Disasters Objectives By the end of this section, the participant should be able to: State the mission of public health Describe the role of public

More information

Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission

Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission Photo courtesy of Justin Reuter Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission CDDA Mission Mission of our CDDA

More information

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests

More information

U.S. HOMELAND SECURITY: A LOOK AT THE FY03 HOMELAND SECURITY BUDGET REQUEST

U.S. HOMELAND SECURITY: A LOOK AT THE FY03 HOMELAND SECURITY BUDGET REQUEST U.S. HOMELAND SECURITY: A LOOK AT THE FY03 HOMELAND SECURITY BUDGET REQUEST The release of the Bush Administration s Homeland Security request to Congress for fiscal year 2003 (FY03) demonstrates the complexity

More information

Ten Steps for Preventing a terrorist Attack

Ten Steps for Preventing a terrorist Attack WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION C-level Executives, Companies Should Take Specific Actions to Protect Employees and Help Ensure Business

More information

FY07 Homeland Security Grants. Dallas City Council Public Safety Committee Briefing November 19, 2007

FY07 Homeland Security Grants. Dallas City Council Public Safety Committee Briefing November 19, 2007 FY07 Homeland Security Grants Dallas City Council Public Safety Committee Briefing November 19, 2007 Purpose Give an overview of the Homeland Security Grant Program (HSGP) Highlight City of Dallas projects

More information

Purpose of the Governor s strategy. Guiding Principles

Purpose of the Governor s strategy. Guiding Principles Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose

More information

COJUMA s. Legal Considerations for Defense Support to Civil Authorities. U.S. Southern Command Miami, Florida Draft

COJUMA s. Legal Considerations for Defense Support to Civil Authorities. U.S. Southern Command Miami, Florida Draft COJUMA s Legal Considerations for Defense Support to Civil Authorities U.S. Southern Command 28 Miami, Florida Miami, Florida Draft Table of Contents Legal Considerations for Defense Support to Civil Authorities.....10

More information

PREPARING YOUR ORGANIZATION FOR PANDEMIC FLU. Pandemic Influenza:

PREPARING YOUR ORGANIZATION FOR PANDEMIC FLU. Pandemic Influenza: PREPARING YOUR ORGANIZATION FOR PANDEMIC FLU Pandemic Influenza: What Business and Organization Leaders Need to Know About Pandemic Influenza Planning State of Alaska Frank H. Murkowski, Governor Department

More information

ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE. Measures toward enhancing maritime cybersecurity. Submitted by Canada SUMMARY

ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE. Measures toward enhancing maritime cybersecurity. Submitted by Canada SUMMARY E FACILITATION COMMITTEE 39th session Agenda item 7 FAL 39/7 10 July 2014 Original: ENGLISH ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE Measures toward enhancing maritime cybersecurity Submitted

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

Information Technology in Transportation Key Issues and a Look Forward

Information Technology in Transportation Key Issues and a Look Forward A5003: Committee on Information Systems and Technology Chairman: Jeffrey L. Western Information Technology in Transportation Key Issues and a Look Forward JEFFREY L. WESTERN, Wisconsin Department of Transportation

More information

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division

More information

NATIONAL NUCLEAR SECURITY ADMINISTRATION

NATIONAL NUCLEAR SECURITY ADMINISTRATION NATIONAL NUCLEAR SECURITY ADMINISTRATION (Discretionary dollars in thousands) FY 2013 FY 2014 FY 2015 FY 2015 vs. FY 2014 Current Enacted Request $ % National Nuclear Security Administration Weapons Activities

More information

a GAO-03-139 GAO BIOTERRORISM Information Technology Strategy Could Strengthen Federal Agencies Abilities to Respond to Public Health Emergencies

a GAO-03-139 GAO BIOTERRORISM Information Technology Strategy Could Strengthen Federal Agencies Abilities to Respond to Public Health Emergencies GAO United States General Accounting Office Report to Congressional Requesters May 2003 BIOTERRORISM Information Technology Strategy Could Strengthen Federal Agencies Abilities to Respond to Public Health

More information

Global Security Academy

Global Security Academy Global Security Academy Athena GS3 Security implementation Systems Ltd. 5 Hatzoref St, Holon, 58856, Israel Tel: +972 3 5572462 Fax: +972 3 5572472 www.athenalss.com Message from Chief Executive Officer

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments London 2012 Olympic Safety and Security Strategic Risk Assessment (OSSSRA) and Risk Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments Introduction London 2012

More information

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board Comprehensive European Security Approaches: EU Security Programmes Robert HAVAS EOS Chairman of the Board INTRODUCTION the EOS Programmes rationale Why implementing EU Security Programmes / ASPIDA approach?

More information

UF EDGE brings the classroom to you with online, worldwide course delivery!

UF EDGE brings the classroom to you with online, worldwide course delivery! What is the University of Florida EDGE Program? EDGE enables engineering professional, military members, and students worldwide to participate in courses, certificates, and degree programs from the UF

More information

Notification Solutions Campus

Notification Solutions Campus Notification Solutions Campus Mass Notification Systems Are you prepared? Every day, a threat or emergency endangers the lives of our students, personnel, and citizens. At a moments notice, emergency managers

More information

National Capital Region: Urban Area Security Initiatives Subgrants as of 02/01/12

National Capital Region: Urban Area Security Initiatives Subgrants as of 02/01/12 National Capital Region: Urban Area Initiatives Subgrants as of 02/01/12 Year Subgrantee Subgrant Name Award American Red Cross of the National Capital Area Mass Care (Maintenance) 146,258 American Red

More information

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security A Holistic Security Risk Management Approach www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security This white paper discusses current

More information