The IJIS Institute Emerging Technologies Committee Presents: Matthew D Alessandro Scott Edson Iveta Topalova

Size: px
Start display at page:

Download "The IJIS Institute Emerging Technologies Committee Presents: Matthew D Alessandro Scott Edson Iveta Topalova"

Transcription

1 The IJIS Institute Emerging Technologies Committee Presents: Matthew D Alessandro Scott Edson Iveta Topalova Realize the Power of Information

2 Non-profit consortium representing leading companies that supply IT solutions and services to the justice, public safety and homeland security sectors Funded by industry contributions and grants from federal agencies Provide training, technology assistance and program management services to state, local, tribal and federal organizations to help them realize the power of information

3 The IJIS Institute unites the private and public sectors to improve critical information sharing for those who provide public safety and administer justice in our communities.

4 is at the heart of everything we can do to reduce crime, prevent terrorism, and improve the quality of public safety in America

5 is the most prolific enabler of secure information sharing across all levels of organizational, jurisdictional and geographic boundaries

6 promote economical and accelerated deployment of technology standards

7 The biggest driver for interoperability in mission fulfillment being able to responsibly share information with adequate safeguards. Kshemendra Paul, PM-ISE

8 Big Data in Simple Terms How Big Data Changes Law Enforcement Taking Advantage of Big Data Enabling Big Data through the CJIS Cloud Policy, Procedures and Governance Execution Q&A

9

10 Big data is a collection of data from traditional and digital sources inside and outside your organization that represents a source for ongoing proactive, reactive and forensic analysis.

11 Data sets whose size and characteristics are beyond the ability of commonly used software tools to capture, store, manage, process and analyze effectively using traditional approaches

12 All the printed material in the world = less than 20 petabytes

13 A full 90% of all the data in the world has been generated over the last two years.

14 Volume -- amount of data at rest Variety data in many different forms Velocity -- speed of data in motion Variability -- inconsistencies over time Veracity inconsistency in quality leading to uncertainty Volume Veracity Variety Variability Velocity COMPLEXITY

15 Volume Velocity Information Overload Variety Variability

16 Acquire Assess Advanced Analytics Act Account

17

18

19

20 Real Time Crime Centers/Intel Centers Intelligence Led Policing Predictive Policing Information Sharing Safe Smart City Initiatives Video Management and Analytics The Internet of Things Body Worn Cameras Mobility

21 Crime has no borders You need to know what is happening even across the line Tools to avoid information overload

22

23

24

25

26

27 IT professionals estimate that they have less than half of the storage, computing, and personnel resources necessary to leverage big data for efficiency gains, better decision making.* Source: The Big Data Gap study sponsored by NetApp and performed by MeriTalk

28 Cloud computing is more than just the latest in a series of attempts to pare down government spending it s a gateway to unprecedented innovation in a sector known more for bureaucratic inertia. Rick Holgate, president of the American Council for Technology (ACT) The experience over the past five years has proven some tangible benefits: - Hybrid cloud enables balance between cost and risk reduction - Cloud enables agility and scalability - Value added services such as Machine Learning and Media Services are key to innovation Source: Forbes 'Government as a Platform': How Cloud Computing Is Progressing Inside The Beltway

29 A Community Cloud based on NIST Definition: The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). Compliance with the CJIS security policy and other national standards.

30 Support for national standards for protecting criminal justice information Data center location and resilience Collaboration with state CSO s in the area of compliance with national standards? Fully isolated network and hardware instance Employees in data center subject to the FBI background check Auditability to demonstrate full compliance with the CJIS Security Policy

31 Common Big Data Definition for Law Enforcement Adoption of a Common Governance Model Clear and Compelling Business Case Development of Common Standards Address Privacy and Security Concerns Identification of Implementation Models

32 New and emerging technologies increasingly play a crucial role in the daily work of police, equipping officers with enforcement and investigative tools that have the potential of making them safer, better informed, and more effective and efficient. Developing and enforcing comprehensive agency policies regarding deployment and use is a critical step in realizing the value that technologies promise, and is essential in assuring the public that their privacy and civil liberties are recognized and protected.

33

34 SEARCH, in partnership with BJA, developed the first Privacy Impact Assessment (PIA) tool to assist agencies when developing or reviewing their privacy and civil liberties policies.

35 License Plate Readers CAD 911 calls, dispatch Vehicle Locators Big Data Officers Need Real Time Officer Vitals hearth beat, blood pressure, etc. Offenders on Parole (ankle bracelets) Cameras, video surveillance Shots fired Social media, citizens as sensors

36 As the world continues to become more and more social competitive advantage will come to those who understand what s happening better than their peers and can directly connect it to their business outcomes and other useful pursuits. * *Source: How social media and big data will unleash what we know by Dion Hinchcliffe

37 Terrorism has gone viral* US officials, lawmakers warn of growing jihad-inspired attacks facilitated through the use of social media. * *Source: *Source: Terrorism has gone viral, FoxNews, Published May 10 th 2015

38 Now there are tools which enable effective use of big data You have to get there because the public will demand it

39 Define your agency s business case Identify and prioritize data Based on Return on Investment Create a roadmap with knowledge gained from data as a foundation

40 Realize the Power of Information

The IJIS Institute Emerging Technologies and Courts Committees Present: Joe Wheeler Charles Byers Iveta Topalova

The IJIS Institute Emerging Technologies and Courts Committees Present: Joe Wheeler Charles Byers Iveta Topalova The IJIS Institute Emerging Technologies and Courts Committees Present: Joe Wheeler Charles Byers Iveta Topalova Realize the Power of Information Non-profit consortium representing leading companies that

More information

Two Recent LE Use Cases

Two Recent LE Use Cases Two Recent LE Use Cases Case Study I Have A Bomb On This Plane (Miami Airport) In January 2012, an airline passenger tweeted she had a bomb on a Jet Blue commercial aircraft at the Miami International

More information

Louis A. Noriega Automated Port Solutions Physical Security and Operations Technology Consultant louis.noriega@aportsolutions.com

Louis A. Noriega Automated Port Solutions Physical Security and Operations Technology Consultant louis.noriega@aportsolutions.com Systems integration, collaboration, and partnerships to leverage existing systems and to eliminate redundant regional information technology initiatives, information sharing Louis A. Noriega Automated

More information

Setting the Standard for Safe City Projects in the United States

Setting the Standard for Safe City Projects in the United States Leading Safe Cities Setting the Standard for Safe City Projects in the United States Edge360 is a provider of Safe City solutions to State & Local governments, helping our clients ensure they have a secure,

More information

IACP BRIEF CYBER SECURITY ADDRESSING THE NEEDS OF LAW ENFORCEMENT. Serving the Leaders of Today, Developing the Leaders of Tomorrow

IACP BRIEF CYBER SECURITY ADDRESSING THE NEEDS OF LAW ENFORCEMENT. Serving the Leaders of Today, Developing the Leaders of Tomorrow IACP BRIEF Serving the Leaders of Today, Developing the Leaders of Tomorrow CYBER SECURITY: CYBER SECURITY ADDRESSING THE NEEDS OF LAW ENFORCEMENT 1 P age OVERVIEW The International Association of Chiefs

More information

Fusion Center Technology Resources Road Map: Elements of an Enterprise Architecture for State and Major Urban Area Fusion Centers

Fusion Center Technology Resources Road Map: Elements of an Enterprise Architecture for State and Major Urban Area Fusion Centers Fusion Center Technology Resources Road Map: Elements of an Enterprise for State and Major Urban Area Fusion Centers General Overview The function of a fusion center is to provide a collection, analysis,

More information

REPORT TO CONGRESS ON THE IMPLEMENTATION OF THE FY 2003 INTEROPERABLE COMMUNICATIONS EQUIPMENT GRANT PROGRAM

REPORT TO CONGRESS ON THE IMPLEMENTATION OF THE FY 2003 INTEROPERABLE COMMUNICATIONS EQUIPMENT GRANT PROGRAM REPORT TO CONGRESS ON THE IMPLEMENTATION OF THE FY 2003 INTEROPERABLE COMMUNICATIONS EQUIPMENT GRANT PROGRAM Department of Homeland Security Emergency Preparedness & Response Directorate May 2003 Table

More information

InforCloudSuite. Public Sector. Overview INFOR CLOUDSUITE PUBLIC SECTOR 1

InforCloudSuite. Public Sector. Overview INFOR CLOUDSUITE PUBLIC SECTOR 1 InforCloudSuite Public Sector Overview INFOR CLOUDSUITE PUBLIC SECTOR 1 What if... You could improve service to your community in spite of having to do more with less? You could implement flexible solutions

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. For an On Demand Business, security

More information

Technology Resource Planning

Technology Resource Planning Technology Resource Planning Part 1: Technology Assessment Summary The Department is dedicated to modernizing and expanding its current information technology function. An independent assessment of the

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Regional Police Collaboration and Community Engagement Using GIS and Crime Analysis Dashboards

Regional Police Collaboration and Community Engagement Using GIS and Crime Analysis Dashboards Regional Police Collaboration and Community Engagement Using GIS and Crime Analysis Dashboards Jason McKinley City of Ann Arbor Matthew Brown San Diego Harbor Police CLEMIS PROJECT CASE STUDY: A dashboard

More information

Department of Homeland Security Information Sharing Strategy

Department of Homeland Security Information Sharing Strategy Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction

More information

Government Security Solutions YOUR PARTNER OF CHOICE. Protecting People, Places And Perimeters

Government Security Solutions YOUR PARTNER OF CHOICE. Protecting People, Places And Perimeters Government Security Solutions YOUR PARTNER OF CHOICE Protecting People, Places And Perimeters From government buildings to military facilities to legislative offices and more, everything is a target. And

More information

GIS for Real-Time Crime Centers. An Esri White Paper June 2013

GIS for Real-Time Crime Centers. An Esri White Paper June 2013 An Esri White Paper June 2013 Copyright 2013 Esri All rights reserved. Printed in the United States of America. The information contained in this document is the exclusive property of Esri. This work is

More information

Cyberprivacy and Cybersecurity for Health Data

Cyberprivacy and Cybersecurity for Health Data Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies

More information

Rapid Visualization with Big Data Analytics. Ravi Chalaka VP, Solution and Social Innovation Marketing

Rapid Visualization with Big Data Analytics. Ravi Chalaka VP, Solution and Social Innovation Marketing Rapid Visualization with Big Data Analytics Ravi Chalaka VP, Solution and Social Innovation Marketing Imagine the Future Innovative cities that dramatically enhance the wellbeing of its citizens Safer

More information

The CHICAGO STORY. Use of CCCTV for General Area Surveillance, Crime Hot Spots, Mobile Applications, and Future Developments

The CHICAGO STORY. Use of CCCTV for General Area Surveillance, Crime Hot Spots, Mobile Applications, and Future Developments The CHICAGO STORY Use of CCCTV for General Area Surveillance, Crime Hot Spots, Mobile Applications, and Future Developments 3rd Largest U.S. City 2.9 million residents 228 square miles CPD 2 nd largest

More information

Addressing government challenges with big data analytics

Addressing government challenges with big data analytics IBM Software White Paper Government Addressing government challenges with big data analytics 2 Addressing government challenges with big data analytics Contents 2 Introduction 4 How big data analytics

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

Community Policing. Defined

Community Policing. Defined Community Policing Defined The Primary Elements of Community Policing Nonprof its / Service Providers Using the Crime Triangle Community policing is a philosophy that promotes organizational strategies

More information

REAL-TIME SOCIAL MEDIA #AWARENESS

REAL-TIME SOCIAL MEDIA #AWARENESS REAL-TIME SOCIAL MEDIA #AWARENESS COMPREHENSIVE SOCIAL INTELLIGENCE TO ENHANCE SITUATIONAL AWARENESS. Alastar s Social Media Awareness Tool allows a user to execute simple to complex searches, continuously

More information

IT UNIFICATION Vision, Impact & Strategy. May 2015

IT UNIFICATION Vision, Impact & Strategy. May 2015 IT UNIFICATION Vision, Impact & Strategy May 2015 Presentation Agenda Why Unification Embracing Business Drivers UC San Diego Strategic Plan IT Unification Vision Campus Impact What s in it for campus?

More information

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee

More information

THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE

THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE BIG DATA ANALYTICS SCOPING REPORT July 20, 2015 DRAFT THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE BIG

More information

THE DOLLARS AND SENSE OF VIDEO EVIDENCE MANAGEMENT

THE DOLLARS AND SENSE OF VIDEO EVIDENCE MANAGEMENT THE DOLLARS AND SENSE OF VIDEO EVIDENCE MANAGEMENT 5 THINGS YOU NEED TO KNOW FOR COST-EFFECTIVELY INTEGRATING AND DEPLOYING BODY-WORN CAMERA SOLUTIONS INTRODUCTION Across the country, law enforcement agencies

More information

Boosting Business Agility through Software-defined Networking

Boosting Business Agility through Software-defined Networking Executive Summary: Boosting Business Agility through Software-defined Networking Completing the last mile of virtualization Introduction Businesses have gained significant value from virtualizing server

More information

Contact Center Security: Moving to the Cloud

Contact Center Security: Moving to the Cloud white paper Contact Center Security: Moving to the Cloud Table of Contents Executive Overview 2 A Critical Attribute of a Cloud Provider: Proven Security 2 How Do Well-established Companies Chose a Cloud

More information

ANNEX ENLETS. Work programme 2014-2020. European Network of Law Enforcement Technology Services 2013-11-10. 17365/13 EB/hm 2 ANNEX DG D 2C LIMITE EN

ANNEX ENLETS. Work programme 2014-2020. European Network of Law Enforcement Technology Services 2013-11-10. 17365/13 EB/hm 2 ANNEX DG D 2C LIMITE EN Delegations will find attached the work programme of the European Network of Law Enforcement Technology Services (ENLETS) 2014-2020. COSI is invited to endorse this work programme. 17365/13 EB/hm DG D

More information

These are just two examples of the opportunities and privacy risks involved in U.S. fusion centers.

These are just two examples of the opportunities and privacy risks involved in U.S. fusion centers. This article was published in the May 2008 issue of The Privacy Advisor. The Privacy Advisor is a membership benefit of the International Association of Privacy Professionals (IAPP). If you are interested

More information

SEARCH. The Global Information Sharing Toolkit: Update on Key Information Sharing Standards. Scott Came Mo West Andrew Owen

SEARCH. The Global Information Sharing Toolkit: Update on Key Information Sharing Standards. Scott Came Mo West Andrew Owen SEARCH The Global Information Sharing Toolkit: Update on Key Information Sharing Standards Scott Came Mo West Andrew Owen Overview Global Standards Data Architecture National Information Exchange Model

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Privacy in the Cloud A Microsoft Perspective

Privacy in the Cloud A Microsoft Perspective A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft

More information

INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE. Guiding Principles on Cloud Computing in Law Enforcement

INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE. Guiding Principles on Cloud Computing in Law Enforcement INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE Guiding Principles on Cloud Computing in Law Enforcement Cloud computing technologies offer substantial potential benefits to law enforcement and government

More information

Contact Center Security: Moving to the True Cloud

Contact Center Security: Moving to the True Cloud White Paper Contact Center Security: Moving to the True Cloud Today, Cloud is one of the most talked about trends in the IT industry. It s a paradigm many believe will have a widespread business impact.

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Using Big Data to Advance Social Missions. Convened by: Title Sponsor: Sponsor:

Using Big Data to Advance Social Missions. Convened by: Title Sponsor: Sponsor: Using Big Data to Advance Social Missions Convened by: Title Sponsor: Sponsor: Welcome Diane Melley Vice President, Global Citizenship Initiatives IBM 2 #POLBizTrack What is Big Data? Big data relates

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive

More information

An Esri White Paper March 2012 GIS for Law Enforcement

An Esri White Paper March 2012 GIS for Law Enforcement An Esri White Paper March 2012 GIS for Law Enforcement Esri, 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB esri.com Copyright 2012 Esri All rights

More information

Homeland Security and Technology Education

Homeland Security and Technology Education Homeland Security and Technology Education A White Paper written for ITEA by Rick Rios and Teena Calkin Anchorage School District 2007 Homeland Security and Technology Education The Alaska Department of

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Joint Wireless Review Committee Business Case

Joint Wireless Review Committee Business Case Joint Wireless Review Committee Business Case 1 Introduction 2 Opportunities 3 Financial, Resource Plan and ROI 4 Risks Conclusion and rewards JWRC Mandate Approve wireless projects Integrated outdoor

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

WPI Personnel Location Briefing. Joe Heaps Deputy Chief Information and Sensor Technologies Division National Institute of Justice

WPI Personnel Location Briefing. Joe Heaps Deputy Chief Information and Sensor Technologies Division National Institute of Justice WPI Personnel Location Briefing Joe Heaps Deputy Chief Information and Sensor Technologies Division National Institute of Justice NIJ s Mission Component of the U.S. Department of Justice (DOJ) Office

More information

Vendor Risk Management Financial Organizations

Vendor Risk Management Financial Organizations Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

Preservation for a Safer World

Preservation for a Safer World Preservation and Archiving Special Interest Group (PASIG) Preservation for a Safer World Hong-Eng Koh Senior Director (Global Lead) Justice & Public Safety A Very Fragmented World

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST

More information

Chief Harlin R. McEwen Chairman Communications & Technology Committee International Association of Chiefs of Police

Chief Harlin R. McEwen Chairman Communications & Technology Committee International Association of Chiefs of Police Chief Harlin R. McEwen Chairman Communications & Technology Committee International Association of Chiefs of Police Chief of Police (Ret) City of Ithaca, NY FBI Deputy Assistant Director (Ret) Washington,

More information

Why Consider Cloud-Based Applications?

Why Consider Cloud-Based Applications? Abstract Achieving success for today s compliance professional is both tougher and easier than ever. On one hand, there are more regulations and standards at almost every level, on the other, there are

More information

NFV Live! 15. Using closed-loop automation and data analytics to manage virtualized and hybrid networks

NFV Live! 15. Using closed-loop automation and data analytics to manage virtualized and hybrid networks NFV Live! MONDAY, MAY 9, 2016 1. CASE STUDY: Real world deployment - the transformation to a virtualized network 2. CROSS INDUSTRY CASE STUDY: Virtualizing the data center to enable the efficient delivery

More information

ROYAL SAINT LUCIA POLICE FORCE STRATEGIC PLAN 2008/2011

ROYAL SAINT LUCIA POLICE FORCE STRATEGIC PLAN 2008/2011 2008 2011 ROYAL SAINT LUCIA POLICE FORCE STRATEGIC PLAN 2008/2011 RSLPF new 2008 STRATEGIC PLAN OUTLINE MISSION VISION ( The Future ) CORE VALUES OBJECTIVES Reduce crime, disorder, and the fear of crime

More information

Hitachi Visualization. Twin Cities Public Safety Presentation

Hitachi Visualization. Twin Cities Public Safety Presentation Hitachi Visualization Twin Cities Public Safety Presentation Safer, Smarter, More Efficient Communities INTEGRATED REPORTING AND ANALYTICS: ACTIONABLE INSIGHT ENERGY UTILITY VEHICLE TRANSIT PUBLIC SAFETY

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

DEPARTMENT OF HOMELAND SECURITY

DEPARTMENT OF HOMELAND SECURITY DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $43.2 billion, an increase of $309 million above the 2010 enacted level. Increases were made in core homeland security functions such as border

More information

The structure and organization of the Fusion Center takes its direction from four key documents, they are:

The structure and organization of the Fusion Center takes its direction from four key documents, they are: The structure and organization of the Fusion Center takes its direction from four key documents, they are: Northern Operational Office MISSION We incorporate information and utilize relationships formed

More information

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality

More information

Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment

Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment This template is provided to support the police service and other law enforcement agencies (LEA)

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Increasing the city s attractiveness

Increasing the city s attractiveness www.thalesgroup.com URBAN SECURITY Increasing the city s attractiveness Thales Communications & Security 20-22 rue Grange Dame Rose - 78141 Vélizy-Villacoublay - France - Tel: +33(0)1 73 32 00 00 10/2013

More information

Hybrid Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Hybrid Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc. Hybrid Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction The economic benefits offered by public clouds are attractive enough for many

More information

FY07 Homeland Security Grants. Dallas City Council Public Safety Committee Briefing November 19, 2007

FY07 Homeland Security Grants. Dallas City Council Public Safety Committee Briefing November 19, 2007 FY07 Homeland Security Grants Dallas City Council Public Safety Committee Briefing November 19, 2007 Purpose Give an overview of the Homeland Security Grant Program (HSGP) Highlight City of Dallas projects

More information

SAFE CITY. The Safe city understands the need for security to evolve from reactive to a proactive and integrated response. PREVENTION + REACTION

SAFE CITY. The Safe city understands the need for security to evolve from reactive to a proactive and integrated response. PREVENTION + REACTION The increased mobility of people combined with the growth in international goods traffic together present national governments and international organizations with new and rapidly changing challenges to

More information

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC) Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,

More information

The Internet on Wheels and Hitachi, Ltd. By Hitachi Data Systems

The Internet on Wheels and Hitachi, Ltd. By Hitachi Data Systems The Internet on Wheels and Hitachi, Ltd. By Hitachi Data Systems November 2014 1 Contents Executive Summary... 2 Introduction... 3 The Undeniable Value of Data... 3 The Smart Car as a Communications Hub...

More information

How to Leverage Big Data in the Cloud to Gain Competitive Advantage

How to Leverage Big Data in the Cloud to Gain Competitive Advantage How to Leverage Big Data in the Cloud to Gain Competitive Advantage James Kobielus, IBM Big Data Evangelist Editor-in-Chief, IBM Data Magazine Senior Program Director, Product Marketing, Big Data Analytics

More information

CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs

CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs Eric Simmon January 28 th, 2014 BACKGROUND Federal Cloud Computing Strategy Efficiency improvements will shift resources towards higher-value

More information

Education Security Solutions YOUR PARTNER OF CHOICE. Challenging Times Call For Uncompromising Solutions

Education Security Solutions YOUR PARTNER OF CHOICE. Challenging Times Call For Uncompromising Solutions Education Security Solutions YOUR PARTNER OF CHOICE Challenging Times Call For Uncompromising Solutions From small schools to multi-campus universities, providing a safe, secure learning environment within

More information

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013 INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.

More information

Ericsson in Public Safety Smart solutions that save lives

Ericsson in Public Safety Smart solutions that save lives Ericsson in Public Safety Smart solutions that save lives Integrated, multiagency emergency response management Ericsson helps Public Safety and Security authorities leverage the power of new technological

More information

CURRICULUM REVISION: MASTER OF PUBLIC ADMINISTRATION: PUBLIC POLICY AND ADMINISTRATION CURRICULUM REVISIONS. REQUIRED COURSES Subtotal: 21

CURRICULUM REVISION: MASTER OF PUBLIC ADMINISTRATION: PUBLIC POLICY AND ADMINISTRATION CURRICULUM REVISIONS. REQUIRED COURSES Subtotal: 21 CURRICULUM REVISIONS CURRICULUM REVISION: MASTER OF PUBLIC ADMINISTRATION: PUBLIC POLICY AND ADMINISTRATION Program Director: Professor Marilyn Rubin The mission of the Master of Public Administration

More information

Cisco Cloud Enablement Services for Education

Cisco Cloud Enablement Services for Education Services Overview Cisco Cloud Enablement Services for Education Bringing the Cloud to the Campus In today s higher education environment, IT organizations must keep pace with a long list of competing demands:

More information

Big Data: Overview and Roadmap. 2015 eglobaltech. All rights reserved.

Big Data: Overview and Roadmap. 2015 eglobaltech. All rights reserved. Big Data: Overview and Roadmap 2015 eglobaltech. All rights reserved. What is Big Data? Large volumes of complex and variable data that require advanced techniques and technologies to enable capture, storage,

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

Digital Customer Experience

Digital Customer Experience Digital Customer Experience Digital. Two steps ahead Digital. Two steps ahead Organizations are challenged to deliver a digital promise to their customers. The move to digital is led by customers who are

More information

Creating a Multi-Agency Shared Software System: Best Practices. A Spillman Technologies White Paper

Creating a Multi-Agency Shared Software System: Best Practices. A Spillman Technologies White Paper Creating a Multi-Agency Shared Software System: Best Practices A Spillman Technologies White Paper Multi-Agency Data Sharing Table of Contents: Introduction...page 1 What is a Multi-Agency Shared Software

More information

Connected Cities Research Program

Connected Cities Research Program Connected Cities Research Program Intelligent Transportation Systems Joint Program Office (ITS JPO) NSF Workshop on Smart Cities Arlington, VA, November 10, 2015 Marcia Pincus Program Manager, Environment

More information

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT IntelliDyne, LLC MARCH 2012 STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

More information

Overview. The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system.

Overview. The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system. Inform RMS The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system. Covering the entire life span of records development from initial generation to

More information

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17 PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17 Issued Date:01-29-15 Effective Date:01-29-15 Updated Date: SUBJECT: DELAWARE VALLEY INTELLIGENCE CENTER UNIT 1. BACKGROUND A. The Delaware Valley Intelligence

More information

Test Data Management in the New Era of Computing

Test Data Management in the New Era of Computing Test Data Management in the New Era of Computing Vinod Khader IBM InfoSphere Optim Development Agenda Changing Business Environment and Data Management Challenges What is Test Data Management Best Practices

More information

View. Select View Managed Video Services ADT

View. Select View Managed Video Services ADT monitoring Access Control Video Surveillance Intrusion Detection Fire & life safety Commercial Solutions ADT SM Select View Managed Video Services Leverage your existing investment in video surveillance

More information

Information Security, PII and Big Data

Information Security, PII and Big Data ITU Workshop on ICT Security Standardization for Developing Countries (Geneva, Switzerland, 15-16 September 2014) Information Security, PII and Big Data Edward (Ted) Humphreys ISO/IEC JTC 1/SC 27 (WG1

More information

A clearer view. Security, compliance, and the cloud

A clearer view. Security, compliance, and the cloud A clearer view Security, compliance, and the cloud 2 A Clearer View ecurñ This document examines the current regulatory climate around the cloud and explains what to look for from a security standpoint

More information

Trust. The platform for business innovation.

Trust. The platform for business innovation. ADP Global Security Trust. The platform for business innovation. HR. Payroll. Benefits. The business operations protection you need, from the partner you trust. These days, every business is in either

More information

Deploying Big Data to the Cloud: Roadmap for Success

Deploying Big Data to the Cloud: Roadmap for Success Deploying Big Data to the Cloud: Roadmap for Success James Kobielus Chair, CSCC Big Data in the Cloud Working Group IBM Big Data Evangelist. IBM Data Magazine, Editor-in- Chief. IBM Senior Program Director,

More information

Scientific Working Group on Digital Evidence (SWGDE)

Scientific Working Group on Digital Evidence (SWGDE) Scientific Working Group on Digital Evidence (SWGDE) Position on the National Research Council Report to Congress Strengthening Forensic Science in the United States: A Path Forward In the National Research

More information

Arizona Department of Homeland Security

Arizona Department of Homeland Security Arizona Department of Homeland Security Arizona Integrated Planning System (AZIPS) Five-Year Strategic Plan 2013-2018 SEPTEMBER 2012 MISSION STATEMENT The mission of the Arizona Department of Homeland

More information

VMware vcloud Powered Services

VMware vcloud Powered Services SOLUTION OVERVIEW VMware vcloud Powered Services VMware-Compatible Clouds for a Broad Array of Business Needs Caught between shrinking resources and growing business needs, organizations are looking to

More information

Facial Comparison and FBI Identification Training

Facial Comparison and FBI Identification Training Facial Comparison and FBI Identification Training Module 1: Introduction to the FBI Face Training Program This work product is solely the product of the FBI. It was created for educational purposes only.

More information

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda

More information

Cisco Cloud Enablement Services for Adopting Clouds

Cisco Cloud Enablement Services for Adopting Clouds Cisco Cloud for Adopting Clouds Cisco Cloud for Adopting Clouds help you understand which applications you need to migrate; build business justifications for migrating your applications to a public cloud

More information

Cybersecurity Framework: Current Status and Next Steps

Cybersecurity Framework: Current Status and Next Steps Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor Adam.Sedgewick@nist.gov National Institute of Standards

More information

Secure Cloud Computing Concepts Supporting Big Data in Healthcare. Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC

Secure Cloud Computing Concepts Supporting Big Data in Healthcare. Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC Secure Cloud Computing Concepts Supporting Big Data in Healthcare Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC Learning Objectives After this session, the learner should

More information

The NEW POSSIBILITY. How the Data Center Helps Your Organization Excel in the Digital Services Economy

The NEW POSSIBILITY. How the Data Center Helps Your Organization Excel in the Digital Services Economy The NEW CENTER OF POSSIBILITY How the Data Center Helps Your Organization Excel in the Digital Services Economy Powering the world s best ideas Dramatic improvements in compute, storage, and network technology

More information

Surveillance Camera Code of Practice A Guide for Councillors

Surveillance Camera Code of Practice A Guide for Councillors Surveillance Camera Code of Practice A Guide for Councillors How well does your authority comply with the 12 guiding principles of the surveillance camera code of practice? Executive Summary The Protection

More information

PREPARE AMERICA for a Unified Response to Terrorism

PREPARE AMERICA for a Unified Response to Terrorism PREPARE AMERICA for a Unified Response to Terrorism A NATIONAL HOMELAND SECURITY PREPAREDNESS TRAINING SOLUTION OFFERED BY AMERICA S S COMMUNITY COLLEGES Revised as of 6/3/04 PREPARE AMERICA VISION America

More information