Specialist Meeting IST-131: Distributed Data Analytics. Description / Purpose

Size: px
Start display at page:

Download "Specialist Meeting IST-131: Distributed Data Analytics. Description / Purpose"

Transcription

1 Specialist Meeting IST-131: Distributed Data Analytics for Combating Weapons of Mass Destruction at 15 th 17 th October 2014 TASC Inc., 8211 Terminal Road, Suite 1000, Lorton, VA. USA. Description / Purpose Combatting Weapons of Mass Destruction (CWMD) is an international military and civilian effort requiring a coordinated international and interdisciplinary effort. WMDs are a domestic threat to all NATO nations as well as in theaters of operation. The most effective approach to CWMD is to detect and disrupt threats early in the threat cycle. This requires the development of alternate signatures through the use of new data sources and analytical techniques. Open source and expanding commercial information sources represent huge potentials for new approaches to detecting illicit Chemical, Biological, Radiological, Nuclear, Explosive (CBRNE) activities. Exemplar information types include social media, professional media, shipping and transportation, law enforcement, and financial transactions. However it is often not possible or desirable to co- locate all these data sources. This forces the requirement for new processes and algorithms to analyze data at rest in various locations and return properly prepared results based on a wide range of criteria. This is a complex problem since the quality and completeness of data sources is often unknown. The issue is only compounded when data representations are not compatible. Resent technical advances in cloud architectures, information analytics, and network connectivity require organizations to reconsider how they approach advanced analytics and leverage the cloud technologies now available to them. Adopting cloud computing strategies represents a new era for national defense agencies information management, distributed computation, and the foundations required for a next generation of visual analytics. Through increased implementation and acceptance of compatible cloud based technologies, NATO members will be able to draw on data and analytic services from a broad swath of related domains that share common needs, such as intelligence, cyber defense, maritime, financial, aviation and transportation, etc. Through this specialist meeting we will bring together experts to identify critical operational and developmental needs. The challenges of developing the underlying data science and computational constructs that will enable the community to pull data out of today s stove- piped systems and integrate it into a data ecosystem that will support cross- discipline data sharing and analytics.

2 Adopting cloud strategies does not on its own address many of the historic computational and visualization challenges faced by our community and it highlights new research needs to fully take advantage of cloud computing. Embracing the opportunities cloud computing represents for visual analytics will allow NATO members to leverage a widely distributed and information rich environment in a manner only previously imagined. Agenda Wednesday, 15 October Session 1: Deploying Big Table Architectures for Analytics: Recently there has been a significant push to use Hadoop and big table architectures for enterprise data management. This session will hold breakout sessions to look at how well these architectures are working for complex analytical and visualization needs and identify next steps in their use Session 2: Managing Data - IO and Computation Strategies: Developing strategies for distributed analytics systems still requires the movement of data. Coordinating the movement of partial results between analytics nodes introduces unique considerations. There are also novel requirements for computational strategies to support the high performance computing needs. These breakout sessions will address current research effort and impact on practical application. Thursday, 16 October Session 3: Distributed Data Visual Analytics: Situational awareness for CWMD should involve many different domains. This session will hold breakout sessions looking at current work in financial, cyber, and transportation using distributed data in visual analytic tools, etc Session 4: Strategies for Challenging Environments: Remote field teams face unreliable communications, restricted bandwidth, and limited processing resources. While Mega Cities have significant infrastructure they are potential breeding grounds for discontent and introduce significant challenges for detecting threats. All of these impact the ability to conduct analysis for countering WMDs. This session will hold breakout sessions looking at how to address these challenges and promote analytics and visualization in these complex environments. Friday, 17 October Session 5: Distributed Computing Policy:

3 Addressing the technical challenges of distributed analytics is only part of the work required. There are policy considerations for data access, collaboration, and application of analytics. This breakout session will look at current policy issues impacting international collaboration on distributed analytics. Refreshments and Meals Catered lunches and refreshments are available throughout the day which costs US$20/person/day in cash. This will be paid at sign- in. We cannot accept checks or credit cards. Visit Request Procedures By 29 September, non- US citizens or those representing non- US organizations need to fill out the following table for each visitor from your organization and submit it to Kate Cordial at Additionally, if you are attending as an Official Foreign Visitor 1, submit a formal Request for Visit to DTRA/SCC- WMD (via DIA) through your Washington, DC embassy using the government- to- government electronic Foreign Visit System. If you are attending as an Unofficial Foreign Visitor 2, submit a Request for Visit through your company or university on official letterhead to VisitorServices- HQC@DTRA.MIL. Kate Cordial kate.cordial_contractor@dtra.mil Last Name First Name Middle Initial Birth Date Country of Birth Passport Number Issuing Country US citizens please contact Kate Cordial and provide full name and affiliation so a visitor request can be submitted. Contact Information If you have any questions, contact the following: 1 Official Foreign Visitor: A representative of a foreign government or international organization on official business; A foreign national sponsored by a foreign government or international organization; A U.S. citizen representing the interests of a foreign government or international organization 2 Unofficial Foreign Visitor: A foreign national representing his own interests or the interests of a U.S. or foreign company or university

4 Kate Cordial Richard May

5 IST-131 Co-Chairs Dr. Richard May (USA) Defense Threat Reduction Agency Dr. Margaret Varga (UK) Seetru Ltd./ Oxford University IST-131 Programme Committee Dr. John Pellengrino (USA) Army Research Laboratory Dr. Timothy Hanratty (USA) Army Research Laboratory Ms. Lisbeth Rasmussen (DNK) Danish Defence Acquisition and Logistics Organization SET-202 Local Host Coordinator Ms. Kate Cordial Defense Threat Reduction Agency phone:

6 TASC, INC. VISITOR PACKAGE Crown Center at 8211 Terminal Road, Lorton VA TASC, Inc. is located at Crown Center, 8211 Terminal Road, Suite 1000, Lorton, VA (right off of Fairfax County Pkwy /VA-7100). Map and detailed directions are attached. 2. Visit/security clearances for classified DTRA-sponsored meetings should be sent directly to DTRA for certifications to TASC. Visit Clearances for unclassified meetings are not required at the TASC Crown Center Facility. Meeting participants must alert a TASC representative at check-in if classified material is brought into the building or if overnight storage is required. 3. All visitors are required to sign-in and obtain a TASC, Inc. Visitor badge. A picture ID is required for check-in. Visitor badges must be worn at all times while in the facility. 4. Lodging with government rates near Crown Center include: Embassy Suites 8100 Loisdale Rd (703) TownePlace Suites 6245 Brandon Ave. (703) Hampton Inn 6550 Loisdale Ct Lorton, VA (703) Holiday Inn Express 6401 Brandon Ave (703) Hilton Springfield 6550 Loisdale Rd (703) Residence Inn 6412 Backlick Rd. (703) FROM DULLES AIRPORT: Exit airport onto Dulles Access Rd toward Washington DC. After about 13 miles, take I- 495 south toward Richmond via Exit 18. Stay on I-495 for 10 miles and merge onto I-95 via Exit 57A toward Richmond. Proceed for about 4 miles. Merge onto Fairfax County Pkwy/VA-7100 S via Exit 166A toward Newington/Fort Belvoir. Proceed less than a 1/8 mile and turn right onto Terminal Rd. Crown Center will be on your left. FROM NATIONAL AIRPORT: Proceed North on ramp. Merge onto George Washington Memorial Pkwy. Continue on GW Pkwy for 1 mile and then merge onto I-395 S toward I-66 W/Richmond. Proceed for approximately 10 miles. I-395 S becomes I-95 S. Proceed for about 3 miles. Merge onto Fairfax County Pkwy/VA-7100 S via exit 166A toward Newington/Fort Belvoir. Proceed less than a 1/8 mile and turn right onto Terminal Rd. Crown Center will be on your left.

7

8

CAREER OPPORTUNITIES

CAREER OPPORTUNITIES Wherever you serve within the Intelligence Community (IC), you will be working to defeat terrorism at home and abroad, prevent and counter the spread of weapons of mass destruction, protect the health

More information

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak

OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland

More information

Ohio Homeland Security Strategic Plan 2013-2016

Ohio Homeland Security Strategic Plan 2013-2016 GOAL 1 Strengthen Ohio s intelligence and information sharing system for the detection and prevention of threats to public safety. Objective 1.1 Support continued development of the information sharing

More information

How To Become A National Security Consultant

How To Become A National Security Consultant (Ed), Ph.D. 735 Woodmoor Acres Drive, Monument, Colorado 80132 (719) 493-2610 edlockephd@gmail.com Professional Profile Eager to share over twenty years of military and government homeland security experience

More information

Big Data Analytics Best Practices

Big Data Analytics Best Practices 1 Big Data Analytics Best Practices Marshall Presser Federal Field CTO Greenplum 2 Big Data Makes the Mainstream 3 WHAT DOES IT TAKE? 4 1. New Applications MADlib 5 2. New Skill Sets -- Data Science 6

More information

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports 2005 SRI International SRI International Company Proprietary Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports Presented to: 10 th Annual Harbor Safety

More information

Iowa Department of Public Defense Military Division

Iowa Department of Public Defense Military Division Iowa Department of Public Defense Military Division 2013 Justice System Appropriation Subcommittee Major General Timothy E. Orr, Iowa National Guard Adjutant General February 13, 2013 Iowa National Guard

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

PASSPORT & VISA NEWS YOUR GUIDE TO OFFICIAL TRAVEL

PASSPORT & VISA NEWS YOUR GUIDE TO OFFICIAL TRAVEL PASSPORT & VISA NEWS YOUR GUIDE TO OFFICIAL TRAVEL DOD PASSPORT & VISA OFFICE, LOGISTICS SERVICES WASHINGTON A MESSAGE FROM THE DIRECTOR Inside This Issue A Message from the Director P.1-2 10 Things to

More information

Systems Integration Report

Systems Integration Report Chemical Biological Defense Acquisition Initiatives Forum () Systems Integration Report October 16, 2012 Michael J Smith Companies in Sector Company BAE CBRN Systems Integration Capability... providing

More information

How To Help The War On Terror

How To Help The War On Terror NATO s Weapons of Mass Destruction Forensics Conference by Arne Thomas WgCdr Jonathan Archer Executive Summary NATO s Comprehensive Strategic Level Policy for Preventing the Proliferation of Weapons of

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST

More information

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board Comprehensive European Security Approaches: EU Security Programmes Robert HAVAS EOS Chairman of the Board INTRODUCTION the EOS Programmes rationale Why implementing EU Security Programmes / ASPIDA approach?

More information

II.K-11.& MASTER INFORMATION EXCHANGE MEMORANDUM. OF UNDERSTANDING ANNEX CONCERNING COMBATING WEAPONS OF MASS DESTRUCTION (WMD) OFFENSIVE.

II.K-11.& MASTER INFORMATION EXCHANGE MEMORANDUM. OF UNDERSTANDING ANNEX CONCERNING COMBATING WEAPONS OF MASS DESTRUCTION (WMD) OFFENSIVE. II.K-11.& MASTER INFORMATION EXCHANGE MEMORANDUM. OF UNDERSTANDING ANNEX CONCERNING COMBATING WEAPONS OF MASS DESTRUCTION (WMD) OFFENSIVE.OPERATIONS 'WA-UK-047-9045 In accordance With the Master. Information

More information

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use Enhancing Safeguards Through Information Analysis: Business Analytics Tools IAEA, Vienna, 09/10/2014 Julian Midwinter - Business Unit Executive i2, Threat and Counter Fraud General Use 2014 IBM Corporation

More information

FY07 Homeland Security Grants. Dallas City Council Public Safety Committee Briefing November 19, 2007

FY07 Homeland Security Grants. Dallas City Council Public Safety Committee Briefing November 19, 2007 FY07 Homeland Security Grants Dallas City Council Public Safety Committee Briefing November 19, 2007 Purpose Give an overview of the Homeland Security Grant Program (HSGP) Highlight City of Dallas projects

More information

Purpose of the Governor s strategy. Guiding Principles

Purpose of the Governor s strategy. Guiding Principles Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose

More information

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise 5 APR 2011 1 2005... Advanced Analytics Harnessing Data for the Warfighter I2E GIG Brigade Combat Team Data Silos DCGS LandWarNet

More information

v. 03/03/2015 Page ii

v. 03/03/2015 Page ii The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course

More information

Espionage and Intelligence. Debra A. Miller, Book Editor

Espionage and Intelligence. Debra A. Miller, Book Editor Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

More information

Defense Budget Programs That Provide Assistance To Foreign Countries

Defense Budget Programs That Provide Assistance To Foreign Countries Defense Budget Programs That Provide Assistance To Foreign Countries 1. Accounting for Missing United States Government Personnel First legislated in 2008. $1,000,000 Section 408 of Title 10, U.S. Code

More information

2013 HOMELAND SECURITY SYMPOSIUM

2013 HOMELAND SECURITY SYMPOSIUM PROMOTING NATIONAL SECURITY SINCE 1919 2013 HOMELAND SECURITY SYMPOSIUM All-Hazards Approach to Homeland Security: Mitigation, Response, Recovery, & Resilience NOVEMBER 7-8, 2013 EVENT #4490 u WASHINGTON,

More information

ASUG North Carolina/Virginia Chapter Meeting Friday, June 14, 2013 9:00 a.m. 4:00 p.m. ET

ASUG North Carolina/Virginia Chapter Meeting Friday, June 14, 2013 9:00 a.m. 4:00 p.m. ET ASUG North Carolina/Virginia Chapter Meeting Friday, June 14, 2013 9:00 a.m. 4:00 p.m. ET Richmond International Raceway Torque Club 600 East Laburnum Ave. Richmond, Virginia 23222 Map & Directions (Click

More information

BSc in Information Technology Degree Programme. Syllabus

BSc in Information Technology Degree Programme. Syllabus BSc in Information Technology Degree Programme Syllabus Semester 1 Title IT1012 Introduction to Computer Systems 30 - - 2 IT1022 Information Technology Concepts 30 - - 2 IT1033 Fundamentals of Programming

More information

COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA

COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA 09/1 8/2009 version UNCLASSIFIED//FOR OFFICIAL USE ONLY Cl VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA DEFINING COUNTERINTELLIGENCE

More information

WELCOME. Congratulations on being selected to serve as a volunteer on the Baldrige Program s 2015 Board of Examiners!

WELCOME. Congratulations on being selected to serve as a volunteer on the Baldrige Program s 2015 Board of Examiners! Table of Contents Welcome... 2 Proof of U.S. Citizenship or Permanent Residency/Real ID... 3 Checklist to Prepare for Training... 4 Training Location and Schedule... 5 Meals... 7 Transportation... 8 Hotel

More information

The Strategic Importance, Causes and Consequences of Terrorism

The Strategic Importance, Causes and Consequences of Terrorism The Strategic Importance, Causes and Consequences of Terrorism How Terrorism Research Can Inform Policy Responses Todd Stewart, Ph.D. Major General, United States Air Force (Retired) Director, Program

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

Intelligence, Statecraft and Multi-dimensional Security in the Caribbean

Intelligence, Statecraft and Multi-dimensional Security in the Caribbean Module 5 Intelligence, Statecraft and Multi-dimensional Security in the Caribbean September 8 12, 2014 Trinidad & Tobago Website http://sta.uwi.edu/iir/academy.asp Telephone: (868) 662-2002 ext. 83237

More information

Export Control Training

Export Control Training 2007 Export Control Training Office of Sponsored Research and Programs Missouri State University Missouri State University Research Security and Export Controls Compliance Manual 11/7/2007 1 As an employee

More information

Maritime Domain Awareness: Mapping, Tracking, and Visualization

Maritime Domain Awareness: Mapping, Tracking, and Visualization Maritime Domain Awareness: Mapping, Tracking, and Visualization Authorized Distributor for: COM DEV USA and exactearth Ltd Proprietary What is Maritime Domain Awareness? Maritime Domain: All areas and

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

2/13/2013 7:30 AM 5:15 PM Registration Wednesday 9:00 AM 10:00 AM Opening Session 10:15 AM 5:15 PM Concurrent Sessions

2/13/2013 7:30 AM 5:15 PM Registration Wednesday 9:00 AM 10:00 AM Opening Session 10:15 AM 5:15 PM Concurrent Sessions 26TH ANNUAL MIS CONFERENCE Get Current Updates From the Web For conference information, visit the NCES website at http://ies.ed.gov/ whatsnew/conferences and select the 2013 NCES Winter Forum and 26th

More information

Joint statement on supply-chain security

Joint statement on supply-chain security Joint statement on supply-chain security The United States and the European Union face similar challenges and share a common approach to the security ofthe supply-chain. We have witnessed several incidents,

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:

More information

MASTER OF PROFESSIONAL STUDIES

MASTER OF PROFESSIONAL STUDIES MASTER OF PROFESSIONAL STUDIES IN THE FIELD OF SECURITY AND SAFETY LEADERSHIP OFFERED BY THE GEORGE WASHINGTON UNIVERSITY COLLEGE OF PROFESSIONAL STUDIES CLASSES HELD AT: THE GW GRADUATE EDUCATION CENTER,

More information

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE

FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE FUNDING FOR DEFENSE, MILITARY OPERATIONS, HOMELAND SECURITY, AND RELATED ACTIVITIES SINCE 9/11 Steven Kosiak, Director of Budget Studies, Center for Strategic & Budgetary Assessments Since the terrorist

More information

Department of Homeland Security Office for Domestic Preparedness. Campus Preparedness Assessment Process

Department of Homeland Security Office for Domestic Preparedness. Campus Preparedness Assessment Process Department of Homeland Security Office for Domestic Preparedness Campus Preparedness Assessment Process Campus Preparedness Assessment-Overview Purpose of the CPA Elements of the CPA How to use the CPA

More information

SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS. Taught Masters programmes

SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS. Taught Masters programmes SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS Taught Masters programmes What s special about studying in the Department of International Relations at Sussex? With a history that spans

More information

National Capital Region: Urban Area Security Initiatives Subgrants as of 02/01/12

National Capital Region: Urban Area Security Initiatives Subgrants as of 02/01/12 National Capital Region: Urban Area Initiatives Subgrants as of 02/01/12 Year Subgrantee Subgrant Name Award American Red Cross of the National Capital Area Mass Care (Maintenance) 146,258 American Red

More information

THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM

THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 09-36 September 2009 THE FEDERAL

More information

Building a BI Solution in the Cloud

Building a BI Solution in the Cloud Building a BI Solution in the Cloud Stacia Varga, Principal Consultant Email: stacia@datainspirations.com Twitter: @_StaciaV_ 2 SQLSaturday #467 Sponsors Stacia (Misner) Varga Over 30 years of IT experience,

More information

For Official Use Only. Springfield-Greene County, Missouri Multi-Year Training and Exercise Plan 2016-2018 (TEP) July 27, 2015. For Official Use Only

For Official Use Only. Springfield-Greene County, Missouri Multi-Year Training and Exercise Plan 2016-2018 (TEP) July 27, 2015. For Official Use Only For Official Use Only Springfield-Greene County, Missouri Multi-Year Training and Exercise Plan 2016-2018 (TEP) July 27, 2015 For Official Use Only SPRINGFIELD-GREENE COUNTY Point of Contact Erin Pope

More information

Cybersecurity Delivering Confidence in the Cyber Domain

Cybersecurity Delivering Confidence in the Cyber Domain Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your

More information

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning

More information

Incident Response to Terrorist Bombings (IRTB) Information Package

Incident Response to Terrorist Bombings (IRTB) Information Package Weapons of Mass Destruction Training Incident Response to Terrorist Bombings (IRTB) Information Package (09/01/06) New Mexico Tech Energetic Material Research and Testing Center EMRTC 801 Leroy Place Socorro,

More information

GLOBAL SHOP SOLUTIONS

GLOBAL SHOP SOLUTIONS GLOBAL SHOP SOLUTIONS 975 Evergreen Circle The Woodlands, Texas 77380 The Woodlands is located 30 miles north of downtown Houston, approximately 30 miles northwest of IAH George Bush Airport and approximately

More information

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 CALL FOR PAPERS for the IST/SET-126 Symposium on Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 to be held in Norfolk Virginia,

More information

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, jfeasel@t-sciences.com Technical POC: George Romas, gromas@t-sciences.com

More information

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU. Council of the European Union Brussels, 16 March 2015 (OR. en) 7272/15 LIMITE JAI 180 COSI 34 ENFOPOL 68 CYBER 18 COTER 50 DAPIX 41 NOTE From: To: Subject: Europol Standing Committee on operational cooperation

More information

Bureau of Industry and Security

Bureau of Industry and Security Bureau of Industry and Security The mission of the Bureau of Industry and Security (BIS) is to advance U.S. national security, foreign policy, and economic objectives by ensuring an effective export control

More information

SMITH & WESSON ACADEMY TRAVEL INFORMATION

SMITH & WESSON ACADEMY TRAVEL INFORMATION SMITH & WESSON ACADEMY TRAVEL INFORMATION AIRPORT Bradley International Airport, located in Hartford (Windsor Locks) CT is approximately 25 miles south of Springfield, MA. RENTAL CARS Hertz, Avis, Dollar

More information

The Role of the Emergency Manager: Has It Changed Since 9-11-01?

The Role of the Emergency Manager: Has It Changed Since 9-11-01? The Role of the Emergency Manager: Has It Changed Since 9-11-01? By Michael J. Fagel, Ph.D., CEM For years, many have defined emergency management as the organization that is known by responses to weather

More information

National Capital Region: Urban Area Security Initiatives Grants Subgrants as of 01/31/14

National Capital Region: Urban Area Security Initiatives Grants Subgrants as of 01/31/14 National Capital Region: Urban Area Initiatives Grants Subgrants as of 01/31/14 Year Subgrantee Subgrant Name Award All Hazards Consortium HSEMA Performance and Professional Development Initiative (DC

More information

14 FAM 730 OFFICIAL MAIL AND CORRESPONDENCE

14 FAM 730 OFFICIAL MAIL AND CORRESPONDENCE 14 FAM 730 OFFICIAL MAIL AND CORRESPONDENCE (CT:LOG-202; 08-10-2015) (Office of Origin: A/LM/PMP/DPM) 14 FAM 731 TYPES OF MAIL ROOMS a. There are four types of mail rooms subject to the policies in chapter

More information

METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide

METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide Contents Introduction...2 Coalition and extranet collaboration... 3 Deploying military units... 4 Fob-rob collaboration...4

More information

e-discovery Conference

e-discovery Conference Information Security & Protection Seminar June 15, 2011 8:00 a.m. to 3:30 p.m. Presented by: ARMA Greater Indianapolis Chapter Session 1: Physical Security, & Handling Classified Information Overview Rolls-Royce

More information

Applied Research Laboratory: Visualization, Information and Imaging Programs

Applied Research Laboratory: Visualization, Information and Imaging Programs Applied Research Laboratory: Visualization, Information and Imaging Programs Dr. Christopher Griffin Applied Research Laboratory Penn State University Applied Research Laboratory - DoD Designated UARC

More information

State of the Art Observations: Maritime Information Systems

State of the Art Observations: Maritime Information Systems State of the Art Observations: Maritime Information Systems Global Maritime Information Sharing Symposium Baltimore, MD 14-16 SEP 2010 John Mittleman, PhD Naval Research Laboratory Washington DC Where

More information

HOMELAND SECURITY INTERNET SOURCES

HOMELAND SECURITY INTERNET SOURCES I&S Internet Sources I&S HOMELAND SECURITY INTERNET SOURCES USEFUL SITES, PORTALS AND FORUMS Homeland Security Home Page http://www.whitehouse.gov/homeland/ A federal agency whose primary mission is to

More information

JEFFERSON LAB Unclassified Foreign Visits & Assignments Program GENERIC SECURITY PLAN For Assignments

JEFFERSON LAB Unclassified Foreign Visits & Assignments Program GENERIC SECURITY PLAN For Assignments NAME: COUNTRY: SPONSOR: DIV/GROUP: PURPOSE: To be filled out by FACTS administrator FACTS Visitor # FACTS Request # JEFFERSON LAB Unclassified Foreign Visits & Assignments Program GENERIC SECURITY PLAN

More information

Radiological Advisory Medical Teams

Radiological Advisory Medical Teams Army Regulation 40 13 Medical Services Radiological Advisory Medical Teams Headquarters Department of the Army Washington, DC 1 October 2012 UNCLASSIFIED SUMMARY of CHANGE AR 40 13 Radiological Advisory

More information

A Biologically Inspired Approach to Network Vulnerability Identification

A Biologically Inspired Approach to Network Vulnerability Identification A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced

More information

unified command course (MGT-314)

unified command course (MGT-314) enhanced ALL-HAZARDS incident management/ unified command course (MGT-314) I was sent to St. Bernard Parish, Louisiana, as the incident commander for 16 days following Hurricane Katrina. The training I

More information

The structure and organization of the Fusion Center takes its direction from four key documents, they are:

The structure and organization of the Fusion Center takes its direction from four key documents, they are: The structure and organization of the Fusion Center takes its direction from four key documents, they are: Northern Operational Office MISSION We incorporate information and utilize relationships formed

More information

ACSAC 2007 - CWID 2007 Data Diode Case Study. http://www.owlcti.com toll free 866.695.3387

ACSAC 2007 - CWID 2007 Data Diode Case Study. http://www.owlcti.com toll free 866.695.3387 ACSAC 2007 - CWID 2007 Data Diode Case Study http://www.owlcti.com toll free 866.695.3387 Coalition Warrior Interoperability Demonstration (CWID) 2007 Case Studies in Data Diode Application http://www.owlcti.com

More information

Reliable, Repeatable, Measurable, Affordable

Reliable, Repeatable, Measurable, Affordable Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you

More information

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the

More information

Urban Mobility India 2011 The IBM Smarter Cities Solutions: Opportunities for Intelligent Transportation

Urban Mobility India 2011 The IBM Smarter Cities Solutions: Opportunities for Intelligent Transportation Urban Mobility India 2011 The IBM Smarter Cities Solutions: Opportunities for Intelligent Transportation Himanshu Bhatt Global Program Director, Market Strategy IBM Software Group Innovative leaders are

More information

This Conference brought to you by www.ttcus.com

This Conference brought to you by www.ttcus.com This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com U.S. Army Intelligence and Security Command Army

More information

Forecast to Industry 2015

Forecast to Industry 2015 Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:

More information

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com

Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests

More information

Information Technology

Information Technology September 11, 2002 Information Technology The Defense Advanced Research Projects Agency s Transition of Advanced Information Technology Programs (D-2002-146) Department of Defense Office of the Inspector

More information

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY

More information

Enterprise Capabilities Descriptions

Enterprise Capabilities Descriptions 1 SYSTEMS ENGINEERING & INTEGRATION 6 COMMUNICATIONS SYSTEMS 11 LIFECYCLE SYSTEMS ENGINEERING 12 LIFECYCLE SYSTEMS INTEGRATION 13 MISSION INTEGRATION 14 DISCIPLINES 15 DOMAINS 2 CYBER 21 CYBER STRATEGIC

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Maximize your Presence

Maximize your Presence Maximize your Presence SPS Sales Summit: Partner Update Agenda Event Overview Personalize Your Experience Logistics 2 1 SPS Sales Summit Theresa Goodreau Director of Marketing POWER the VISION Hilton Houston

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5230.20 June 22, 2005 USD(P) SUBJECT: Visits and Assignments of Foreign Nationals References: (a) DoD Directive 5230.20, "Visits, Assignments, and Exchanges of Foreign

More information

Partnering with Small Business

Partnering with Small Business Partnering with Small Business Small Business Breakfast Ms. Essye Miller Director, Cyber Security, Army CIO/G-6 1 UNCLASSIFIED Army CIO/G-6 Organization CIO / G-6 Deputy, CIO / G-6 LTG Robert Ferrell Mr.

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

Assessment of the Terror Threat to Denmark

Assessment of the Terror Threat to Denmark 19 March 2015 Assessment of the Terror Threat to Denmark Summary The terrorist attacks in Copenhagen on 14 and 15 February 2015 confirm that the terror threat to Denmark is significant. There are individuals

More information

Promoting Rapid Tech Insertion and the Importance of Domestic and International Collaboration

Promoting Rapid Tech Insertion and the Importance of Domestic and International Collaboration Promoting Rapid Tech Insertion and the Importance of Domestic and International Collaboration Security Network East Washington, D.C. May 2012 Anthony Ashley, PhD Director General Defence R&D Canada Centre

More information

SAIC Corporate and Small Business Introduction

SAIC Corporate and Small Business Introduction SAIC Corporate and Small Business Introduction April 2016 Michael A. Townsend, Sr. Director, SBLO SAIC Small Business Development and Utilization Office SAIC. All rights reserved. SAIC Overview Leading

More information

BSc in Information Systems Degree Programme. Syllabus

BSc in Information Systems Degree Programme. Syllabus BSc in Information Systems Degree Programme Syllabus Semester 1 Title IS1012 Introduction to Computer Systems 30 - - 2 IS1022 Information Technology Concepts 30 - - 2 IS1033 Fundamentals of Programming

More information

SAMPLE COURSE SYLLABUS*

SAMPLE COURSE SYLLABUS* DSS CENTER FOR DEVELOPMENT OF SECURITY EXCELLENCE (CDSE) EDUCATION DIVISION Managing a DoD Installation Security Program ED 507 SAMPLE COURSE SYLLABUS* A. DESCRIPTION The 2007 Defense Installations Plan

More information

Cyber Threat Summit Brochure

Cyber Threat Summit Brochure 2012 Cyber Threat Summit Brochure The European Cyber Threat Summit will be held over two days in Dublin. The syllabus will be delivered by over 20 of the world s leading cyber security experts with a specific

More information

Table of Contents. Ezenia Inc. Evolution of Multi-Level Security

Table of Contents. Ezenia Inc. Evolution of Multi-Level Security Table of Contents Part 1: Introduction......... 1 Utilizing real-time collaboration to enhance effective information exchange in a multi-agency situation Part 2: The Threat.... 2 A real life hypothetical

More information

MAPLA 2014 Law School Caravan University of Wisconsin-Madison Thursday, September 18, 2014

MAPLA 2014 Law School Caravan University of Wisconsin-Madison Thursday, September 18, 2014 SITE COORDINATOR INFORMATION: MAPLA 2014 Law School Caravan University of Wisconsin-Madison Thursday, September 18, 2014 Name and Title: Contact Information: Sherri Ann Charleston Director, Center for

More information

Service Oriented Architecture for Net Centric Operations based on Open Source Technology

Service Oriented Architecture for Net Centric Operations based on Open Source Technology Service Oriented Architecture for Net Centric Operations based on Open Source Technology Sanjiva Weerawarana, Ph.D. Founder, Chairman & CEO, WSO2 Founder, Director & Chief Scientist, Lanka Software Foundation

More information

INFRAGARD.ORG. Portland FBI. Unclassified 1

INFRAGARD.ORG. Portland FBI. Unclassified 1 INFRAGARD.ORG Portland FBI 1 INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2 INFRAGARD Provides a trusted environment for the exchange of Intelligence

More information

HOMELAND SECURITY MARKET DEVELOPMENT IN ILLINOIS

HOMELAND SECURITY MARKET DEVELOPMENT IN ILLINOIS HOMELAND SECURITY MARKET DEVELOPMENT IN ILLINOIS The Role of Community Colleges in Workforce Education ICCB Homeland Security Conference 2/21/2007 Present by: Michael Brody, Assistant Deputy Director The

More information

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments London 2012 Olympic Safety and Security Strategic Risk Assessment (OSSSRA) and Risk Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments Introduction London 2012

More information

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength Enterprise IT Aligning Strong Solutions, Assuring Enterprise Strength Strategic planning aligns your enterprise IT infrastructure with your mission, operational and efficiency goals. From the start, we

More information

Leveraging Network Infrastructure to Bring Critical Information to Users

Leveraging Network Infrastructure to Bring Critical Information to Users Leveraging Network Infrastructure to Bring Critical Information to Users 13 May 2013 Brian Slaughter Director, Global Public Safety Sales General Dynamics C4 Systems 2013 General Dynamics. All rights reserved.

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.68 December 5, 2013 DA&M SUBJECT: Pentagon Force Protection Agency (PFPA) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority vested in the Secretary

More information

The DoD CIO Charter:

The DoD CIO Charter: George Mason University, Fairfax, VA The DoD CIO Charter: A Template for I.T. Governance? Paul A. Strassmann,October 3, 2005 1 Authority for the DoD CIO 2 Traditional Views of the CIO Roles 3 An Expansive

More information

BSc in Information Systems & BSc in Information Technology Degree Programs

BSc in Information Systems & BSc in Information Technology Degree Programs BSc in Information Systems & BSc in Information Technology Degree Programs General Sir John Kotelawala Defence University is about to start the above mentioned degree programs at Hambanthota Southern Campus

More information

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES Northern Border Activities B-1 July 2012 CBP MISSION We are the guardians of our Nation s borders. We are America s frontline.

More information

Citizen's Charter Department of Defence Research and Development Government of India 2015

Citizen's Charter Department of Defence Research and Development Government of India 2015 Citizen's Charter Department of Defence Research and Development Government of India 2015 1 Vision Make India prosperous by establishing world class science and technology base and provide our Defence

More information

Attachment 3: 1977 Department of Defense 3-Digit Enlisted Occupational Classification System

Attachment 3: 1977 Department of Defense 3-Digit Enlisted Occupational Classification System Attachment 3: 1977 Department of Defense 3-Digit Enlisted Occupational Classification System SOURCE: Department of Defense, Manpower, Reserve Affairs and Logistics. Occupational Conversion Manual. Defense

More information