NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security)
|
|
|
- Opal Jennings
- 10 years ago
- Views:
Transcription
1 NSF Webinar on NSF Solicita9on NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) Farnam Jahanian, Keith Marzullo, Angelos D. Keromy9s, David Corman Jeremy Epstein, Ralph Wachter, Nina Amla Directorate for Computer and Informa9on Science and Engineering N a t i o n a l S c i e n c e F o u n d a t i o n Wen- Hann Wang, J. Christopher Ramming, Ken, Anderson, John Manferdelli I n t e l C o r p o r a t i o n 30 June 2014
2 Outline Joint NSF- Intel Partnership Cyber- Physical Systems Security Challenges Program Details Breakthrough Awards Synergy Awards Ideas Lab Frequently Asked Ques9ons Program Director Contacts 2
3 NSF- Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) Jointly funded partnership between Na9onal Science Founda9on (NSF) and Intel Corpora9on Suppor9ng fundamental research to make Cyber- Physical Systems more trustworthy and secure, integra9ng technical, social, and economic perspec9ves Develop a community of researchers focused in this area Partnership with Intel provides researchers greater insight and access to industry needs/capabili9es/resources; facilitates transi9on to prac9ce; and provides students opportuni9es to engage with industry 3
4 Cyber- Physical Systems Cyber computaeon, communicaeon, and control that are discrete, logical, and switched Physical natural and human- made systems governed by the laws of physics and operaeng in conenuous Eme Cyber- Physical Systems sociotechnical systems in which the cyber and physical systems are Eghtly integrated at all scales and levels 4
5 Cyber- Physical Systems Trends ImpacEng Security & Trustworthiness Reci9ng the hallmark characteris9cs: Cyber capability (sensing and/or actua9ng) in every physical component Networked at mul9ple and extreme scales Complex at mul9ple temporal, spa9al, social, and industrial scales Cons9tuent elements are coupled logically and physically Dynamically reorganizing/reconfiguring; open systems High degrees of automa9on, control loops closed at many scales Unconven9onal computa9onal & physical substrates (such as bio, nano, chem, ) OperaEon must be dependable, cerefied in some cases 5
6 NSF Model for ExpediEng Progress Abstract from sectors to more general principles aeronautics medical agriculture Apply these to problems in new sectors Build a new community automotive Core Science, Technology Engineering manufacturing Safety Verifica-on Security Embedded Distributed Networked Hybrid Control Real- -me/fault tolerant Interoperable Scalable energy chemical materials APPLICATION SECTORS civil CORE SCIENCE, TECHNOLOGY and ENGINEERING informed by social science, economics, and policy
7 Challenges Sensing and collec9on of informa9on related to a large spectrum of everyday human ac9vi9es Non- reversible interac9ons with physical world Scale of deployment Federated nature of many CPS- based infrastructures Deep embedding ( hidden ) and long projected life9mes Reliance on subtle assump9ons at interface boundaries Hardware and soeware components, human operators and maintainers Human interac9on as an arbitrator of CPS security is limited Mul9- stakeholder environment Manufacturers, operators, users Varying degrees of exper9se and control Mee9ng social needs, balancing economic constraints, and formula9ng policy 7
8 How can we enable secure and privacy-preserving Cyber-Physical Systems without sacrificing the benefits of integrating automation with the physical environment? 8
9 CPS- Security Program Goals & ObjecEves Goal: Foster transforma9ve, mul9- disciplinary approaches that address the problem of securing current and emerging cyber- physical systems, the infrastructures they form, and those infrastructures integrated with them ObjecEves: Understand the range of technical issues affec9ng hardware and soeware in infrastructure components, and their integra9on in sociotechnical systems Develop an understanding of the interplay between key technical, social, and policy aspects 9
10 Sample Topics of Interest Security Architectures for CPS Tools and Methodologies for Secure CPS Development, Verifica9on and Analysis Current and Future Threat Assessment and Countermeasures Balance of technical solu9ons, regula9on, and policy incen9ves to enhance privacy and security Effec9ve, Secure, Reliable Control in Centralized and Decentralized Systems 10
11 SolicitaEon Details Ideas Lab Synergy Proposals Breakthrough Proposals Eligibility: US Universi9es and Colleges 11
12 Ideas Lab Precursor to the submission of full proposals Par9cipa9on not required for full proposal submission Goals: Iden9fy and develop novel ideas at the intersec9on of CPS and Cybersecurity Assist in the establishment of research partnerships Par9cipa9on by invita9on, following submission of preliminary proposals 12
13 Preliminary Proposals Necessary for par9cipa9on in the Ideas Lab Deadline: July 29 Submission via Fastlane only (not Grants.gov) Individual submissions (no co- PIs) Proposal contents 2 pages of Project Descrip9on Must follow specific guidelines (see Solicita9on for details) Biographical Sketch Current & Pending Support All other elements (e.g., Summary, Budget, ) are waived Responses/invita9ons by August 5 13
14 Ideas Lab Mechanics Intensive 5- day residen9al workshop Real- 9me and itera9ve review process of research ideas Assisted by a team of professional facilitators and a group of mentors (researchers with relevant exper9se) par9cipants Dates: August LocaEon: Washington DC area Travel expenses will be covered by reimbursement through the Compu9ng Research Associa9on (CRA) Submission of Preliminary Proposal implies agreement to amend the full Ideas Lab if invited 14
15 Ideas Lab Proposals Mentors will provide recommenda9ons to NSF about ideas developed in the Lab Within 7-14 days, NSF will determine which par9cipant teams will be invited to submit full proposals Invita9on does not imply funding guarantee! Non- invited ideas can s9ll be submimed as full proposals Repeat: par9cipa9on or invita9on not required for full proposal submission 15
16 Full Proposal Submission Details Proposal Type BREAKTHROUGH SYNERGY CondiEons < $500,000 & up to 3 years < $3,000,000 & up to 3 years Proposal Limits Two (2) Proposals per PI Dis9nct from the PI limits of SaTC or CPS solicita9ons Title Format Begins with Breakthrough: Begins with Synergy: Deadline Thu 28 October :00PM Proposers Local Time Must upload statement of consent (as Supplemental Documenta9on) that indicates NSF may share with Intel the proposal, the reviews generated for the proposal, and any related informa9on No classified proposals will be accepted 16
17 Full Proposal Review Process Administered by NSF, in accordance with NSF standards and procedures NSF and Intel program directors coordinate on review panels and award recommenda9ons for Synergy proposals Projects selected for joint funding by NSF and Intel will be funded through separate NSF and Intel funding instruments 17
18 CPS- Security Synergy Proposals Jointly funded by NSF and Intel Expected number of awards: 2 Take a holis9c view of the challenges in protec9ng CPS Account for technical, human, policy, and economics factors Separate 2- page collabora9on plan is required Addi9onal Solicita9on Specific Review Criteria 1. Degree of integra9on of the technical research with the broader security context in CPS 2. Pursue the development of a Systems perspec9ve and drive toward demonstra9ons of interrelated component research ideas 18
19 CPS- Security Breakthrough Proposals Funded by NSF Encourage the collabora9on of at least two PIs Bring together the CPS and SaTC communi9es Separate 2- page collabora9on plan is required Expected number of awards: 4 19
20 Award Details NSF and Intel will manage their respec9ve award according to their own procedures and guidelines All Synergy awards involving Intel funds will be made under a contract that requires: 1. All source code that has been authored while working on such an award will be distributed under a BSD, Apache or other equivalent open- source license. GNU s GPL or LGPL, the Ar9s9c License, or the Mozilla Public License are not considered equivalent. See solicita9on for details. 20
21 Award Details All Synergy awards involving Intel funds will be made under a contract that requires: 2. No incorpora9on of any third- party code or background intellectual property, except by separate pre- arrangement with NSF and Intel, into data or soeware generated while performing the work under the award, if said incorpora9on would limit or restrict the ability to distribute the data or code under an open source license. 3. Awardees may file patent applica9ons, providing that they grant to Intel a non- exclusive, worldwide, royalty- free, sub- licensable license to all intellectual property rights in any inven9ons or works of authorship resul9ng from research conducted under the joint award. Note that condi9ons 1, 2 and 3 do not apply to Breakthrough awards 21
22 Intel ParEcipaEon in Research Intel may separately fund its own personnel to directly par9cipate in awardee ins9tu9ons Under mutual consent by Intel and awardee ins9tu9on Goal: iden9fy opportuni9es for technology transfer, act as advisors or collabora9ng researchers Intel may also designate (by mutual agreement) a senior researcher as a member of the Project Management Team 22
23 Post Award Management For all: Awardees must submit annual reports to the appropriate funder(s) For all: One or more project representa9ves must amend the next NSF/SaTC PI mee9ng (following project award) Synergy- only: Intel will conduct annual retreats Synergy- only: Annual on- site reviews may be conducted jointly by NSF and Intel Synergy- only: Intel may lead the organiza9on of phone calls with project teams; NSF may par9cipate 23
24 Takeaways CPS- Security is an exci9ng new opportunity for NSF funded researchers to work closely with industry and to explore an increasingly important area domain. CPS- Security researchers will help provide assurance that sociotechnical Cyber- Physical Systems will be secure and trustworthy into the future. Proposals due 28 October 2014 to NSF Contact an NSF and/or Intel program officer with ques9ons! 24
25 For further queseons If you have addi9onal ques9ons aeer the webinar concludes, please send them via to Angelos D. Keromy9s, NSF CISE/CNS, (703) , David Corman, NSF CISE/CNS, (703) , J. Christopher Ramming, Intel, (408) , John Manferdelli, Intel, (510) , Jeremy Epstein, NSF CISE/CNS, (703) , Ralph Wachter, NSF CISE/CNS, (703) , with the subject line star9ng with CPS- Security: The presenta9on will be available following the WEBINAR at hmps:// The solicita9on is available at hmp:// 25
26 Q u e s t i o n s? The telephone line is now open 26
27 Frequently Asked QuesEons 27
28 Frequently Asked QuesEons Proposal Submission Related Q: Can I submit the same proposal to SaTC or CPS, and CPS- Security? A: No, you must choose one program. Q: Does a submission to CPS- Security count towards the 2 proposal limit for SaTC? A: No, you can submit 2 proposals to SaTC and 1 to CPS- Security. Q: Can a CPS- Security proposal include a TransiEon to PracEce OpEon? A: No, those are for SaTC only. 28
29 Frequently Asked QuesEons Scope Related Q: How do I decide whether to submit to SaTC or CPS- Security? A: If you are interested in the benefits that go along with Intel funding then please submit to CPS- Security. Talk to a SaTC or Intel program director if you are unsure. Q: Does the new CPS- Security program mean that SaTC will be reducing funding for CPS security? A: No. CPS security is sgll a priority for SATC. 29
30 Frequently Asked QuesEons Award Related Q: How many awards will be made? A: We expect to make 6 CPS- Security awards (4 Breakthrough and 2 Synergy), subject to the availability of funds. Q: Is there a difference contractually between an NSF award and an Intel award? A: The NSF funding agreement is a grant ; the Intel funding agreement is a contract. Deliverables vary. 30
31 Frequently Asked QuesEons Award Related Q: If co- funded, is the same proposal used for both NSF and Intel? A: Yes. There is a single technical descripgon or Statement of Work for each project, but two funding agreements. Awardees will be provided guidance on how to split the budget. Q: Will Intel fund parecipants at non- US insetueons (which are not funded by NSF)? A: No. All funded pargcipants must follow standard NSF eligibility requirements. 31
32 Frequently Asked QuesEons Financial Related Q: Is this new money (in addieon to SaTC)? A: NSF is funding CPS- Security out of SaTC funds. We are pleased to combine NSF funds with Intel funds. Q: Is CPS- Security a mule- year program? A: Yes. NSF angcipates congnuing investment in this area for mulgple years, subject to the availability of funds. 32
33 Frequently Asked QuesEons Intellectual Property Related Q: Are there any restriceons on intellectual property as a result of Intel involvement? A: For Synergy awards: Under the standard Intel contract, the University retains ownership and Intel receives a non- exclusive royalty free license to any IP developed. For Breakthrough awards: These are standard NSF awards with no pargcipagon by Intel. The University retains full ownership. Q: Can we get access to Intel technology? A: PotenGally. This would be handled on a case by case basis between Intel and the awardee university. 33
34 Frequently Asked QuesEons AddiEonal PI Requirements Q: Do I have to abend the NSF biennial SaTC PI MeeEngs and Intel reviews? A: For Synergy awards: yes For Breakthrough awards: only the NSF biennial SaTC PI MeeGngs Q: Do I have to submit reports to both Intel and NSF on a CPS- Security award? A: Yes, for Synergy awards. The contents of the two are similar. 34
35 Frequently Asked QuesEons Post Award Related Q: Will Intel be acevely involved as collaborators and working on spin- off projects, or provide in- kind support? A: Intel may fund its own personnel to directly pargcipate in research done through Synergy awards, via its Researchers in Residence program. This will require mutual consent between Intel and the awardee. Intel may designate (and self- fund) one of its senior researchers to work alongside the Synergy PI(s), as member of the project management team, providing perspecgve on commercial aspects, help with day- to- day leadership of the center, and coordinate engagement of all other Intel researchers. 35
Take My Cash, Please. aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) (only be sure always to call it, please, research)
Take My Cash, Please (only be sure always to call it, please, research) aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) The SaTC Team: Nina Amla, Chris Cli.on, Jeremy Epstein,
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Alice Squires, [email protected] Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John BrackeL, Mary VanLeer, Tom
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael
Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology
Mission To provide higher technological educa5on with quality, preparing competent professionals, with sound founda5ons in science, technology and innova5on, commi
Challenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS
Challenges of PM in Albania and a New Professional Perspec8ve Prepared by: Dritan Mezini, MBA, MPM B.S. CS Table of contents Presenter s brief introduc8on General Concepts What is a project? What is Project
CC-NIE PI Workshop Plenary
CC-NIE PI Workshop Plenary Farnam Jahanian April 30, 2014 Image Credit: Exploratorium. Pervasive Impact We are at the center of an ongoing societal transformation and will be for decades to come. Advances
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895
UAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
ECEC 22013. Accelera@ng Europe s Cloud Future. Chambre du Commerce September. October. 14. Mai 2013, Konzerthaus. 1st 2014
ECEC 22013 014 ECDC Partnerschaft in in der der Cloud Cloud Partnerschaft Accelera@ng Europe s Cloud Future Europe Congress & A ward Ceremony 14. Mai 2013, Konzerthaus Chambre du Commerce 14. Mai 2013,
Pu?ng B2B Research to the Legal Test
With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the
PES Has The Sustainable Solu2on For Chronic Care Management
PES Has The Sustainable Solu2on For Chronic Care Management Empowering pa2ents to lead the management of their chronic diseases through a proven and effec2ve model of collabora2on with clinicians and caregivers.
Capitalize on your carbon management solu4on investment
Capitalize on your carbon management solu4on investment Best prac4ce guide for implemen4ng carbon management so9ware Carbon Disclosure Project +44 (0) 20 7970 5660 [email protected] www.cdproject.net
Business Analysis Center of Excellence The Cornerstone of Business Transformation
February 20, 2013 Business Analysis Center of Excellence The Cornerstone of Business Transformation John E. Parker, CEO Enfocus Solutions Inc. www.enfocussolutions.com 0 John E. Parker (Introduc3on) President
Na#onal Cybersecurity Network. Advancing Innova,ve Workforce Solu,ons for America s High- Skilled, High- Demand Jobs December 2, 2014
Na#onal Cybersecurity Network Advancing Innova,ve Workforce Solu,ons for America s High- Skilled, High- Demand Jobs December 2, 2014 BHEF s Na*onal Higher Educa*on and Workforce Ini*a*ve (HEWI) BHEF Strategy
Introduc)on to the IoT- A methodology
10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
Business Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc.
Business Analysis Standardization A Strategic Mandate John E. Parker CVO, Enfocus Solu7ons Inc. Agenda What is Business Analysis? Why Business Analysis is Important? Why Standardization of Business Analysis
CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records
electronic Medical Records and Genomics CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records Brian Shirts, MD, PhD University of
U.S.UCAN and its role in Wisconsin
U.S.UCAN and its role in Wisconsin Mark Johnson Interim Execu=ve Director, U.S. UCAN May 8, 2012 1 6/6/12, 2011 U.S. UCAN February 2009: An inflec=on point From BroadbandUSA.gov: The American Reinvestment
Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013
Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed
About the Board. Minnesota Board of Behavioral Health and Therapy 10/24/12. Minnesota Board of Behavioral Health and Therapy
Minnesota Board of Behavioral Health and Therapy Kari Rechtzigel, Executive Director Samantha Strehlo, LADC Licensing Coordinator Judi Gordon, LADC, RN, Board Chair Minnesota Board of Behavioral Health
Exchange of experience from a SuccessFactors LMS Implementa9on
Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist
Workshop #1. Structuring complex partnered research projects and proposals
Workshop #1 Structuring complex partnered research projects and proposals Facilitator: Belinda Leach, Associate Dean Research, College of Social and Applied Human Sciences Presenters: Ben Bradshaw, Belinda
Achieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department November 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
Data Governance Framework: Bank of Canada
Data Governance Framework: Bank of Canada The views and opinions expressed herein are those of the author and do not necessarily reflect the official policy or posi8on of the Bank of Canada or any agency
So#ware quality assurance - introduc4on. Dr Ana Magazinius
So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something
Everything You Need to Know about Cloud BI. Freek Kamst
Everything You Need to Know about Cloud BI Freek Kamst Business Analy2cs Insight, Bussum June 10th, 2014 What s it all about? Has anything changed in the world of BI? Is Cloud Compu2ng a Hype or here to
Part 1 : STRATEGIC : But let s begin with WHY : Why are we doing this?
Part 1 : STRATEGIC : Why DO we care?? What is YOUR cri=cal message? And WHO do you need to reach? : I ll try and give you some pointers and ideas for where to look and how to figure that out for your cons=tuents
CMMI for High-Performance with TSP/PSP
Dr. Kıvanç DİNÇER, PMP Hace6epe University Implemen@ng CMMI for High-Performance with TSP/PSP Informa@on Systems & SoFware The Informa@on Systems usage has experienced an exponen@al growth over the past
Vision of Interoperability Jamie Ferguson, Stan Huff, Cris Ross
Vision of Interoperability Jamie Ferguson, Stan Huff, Cris Ross Evolu&on of Interoperability As HIE evolves, the interoperability framework standards advance for reliable exchange and data integra=on across
GAME-CHANGING TRENDS IN SUPPLY CHAIN
customer teams FIRST focused ANNUAL on serving REPORT override system designations BY THE of SUPPLY available CHAIN MANAGEMENT FACULTY AT THE The research partners at UNIVERSITY Ernst and Young OF TENNESSEE
Pathways Programs. Recrui'ng and Hiring Students and Recent Graduates into Federal Careers
Pathways Programs Recrui'ng and Hiring Students and Recent Graduates into Federal Careers Pathways Programs Presiden1al Execu1ve Order 13562 created Pathways Programs to recruit, hire, develop, and retain
Bank of America Security by Design. Derrick Barksdale Jason Gillam
Bank of America Security by Design Derrick Barksdale Jason Gillam Costs of Correcting Defects 2 Bank of America The Three P s Product Design and build security into our product People Cultivate a security
QEM /CAREER Workshop. Wanda E. Ward, PhD. Office of International and Integrative Activities (IIA) National Science Foundation March 14, 2014
QEM /CAREER Workshop Wanda E. Ward, PhD Office of International and Integrative Activities (IIA) National Science Foundation March 14, 2014 First Lady Michelle Obama speaking at the White House in connec;on
Selling Hosted MS Exchange 2010 & SharePoint
Selling Hosted MS Exchange 2010 & SharePoint Presenters: David Kidd, Senior Manager, Product Management Verio Tim Shields, President and Owner Shields Technologies Moderator: Janine Soika, Channel Market
The Shi'ing Role of School Psychologists within a Mul7-7ered System of Support Framework. FASP Annual Conference October 29, 2015
The Shi'ing Role of School Psychologists within a Mul7-7ered System of Support Framework FASP Annual Conference October 29, 2015 Dr. Jayna Jenkins, Florida PS/RtI Project EARLY WARNING SYSTEMS AND THE
Case Study. The SACM Journey at the Ontario Government
Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al
IT Change Management Process Training
IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge
Legacy Archiving How many lights do you leave on? September 14 th, 2015
Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory
Fixed Scope Offering (FSO) for Oracle SRM
Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November
Computer Security Incident Handling Detec6on and Analysis
Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION
We are pleased to offer the following program to Woodstock Area Educators:
DATE: Spring 2016 TO: RE: Woodstock Area Educators Upcoming Cohort Programs Presently, many teachers are enrolled in cohort graduate programs through partnerships between local regional offices of education,
UNIFIED, END- TO- END EDISCOVERY
ac.onable informa.on governance Partners Providing Excellence in: UNIFIED, END- TO- END EDISCOVERY 2011 IBM Corpora.on Meet the Presenters Amir Jaibaji Vice President, Product Management StoredIQ Kevin
Building your cloud porbolio APS Connect
Building your cloud porbolio APS Connect 5 th November 2014 Duncan Robinson, Parallels Business Consul3ng Introduc/on to BCS Who are we? Created 3 years ago in response to partner demand Define the strategy
Research in Simulation: Research and Grant Writing 101
Research in Simulation: Research and Grant Writing 101 Amar Patel, MS, NREMT-P, CFC Director, Center for Innovative Learning WakeMed Health & Hospitals Geoff Miller Director Eastern Virginia Medical School
AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT
AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Management Expert September 2015 This presenta?on contains extracts from books that are: Copyright 2011 John Wiley & Sons,
