Cyber Security Awareness Workshop
|
|
|
- Stephany Gardner
- 10 years ago
- Views:
Transcription
1 December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing Our ecity Foundation. C-STARR is a regional program, made possible by a Homeland Security grant, and focuses on the cyber threat to the small business community. This program is planned and conducted in conjunction with the Naval Postgraduate School s Center for Asymmetric Warfare. The information contained in this Participant Guide is UNCLASSIFIED and approved for public release.
2 AGENDA Time 8:00 8:15 AM 8:15 8:30 AM Registration and Check-In Event All participants, please sign in and verify your contact information Welcome and Introductions Alan Watkins Program Manager, Regional Cyber Security Program Brendan Applegate Deputy Director for Planning, Center for Asymmetric Warfare 8:30 8:45 AM Keynote Speaker Honorable Mitch Dembin U.S. Magistrate Judge, Southern District of California 8:45 9:15 AM What Keeps You Up at Night? Discussion Alan Watkins Scott Brewer Deputy Director for Operations, Center for Asymmetric Warfare 9:15 9:25 AM Distribute Cyber Security Questionnaire and Break 9:25 9:55 AM Critical Infrastructure Business Impacts Ron Simmons Security Operations Manager, San Diego Gas & Electric Co. 9:55 10:20 AM Questionnaire Work Period 10:20 10:30 AM Break 10:30 11:00 AM 11:00 11:40 AM 11:40 AM 12:05 PM 12:05 12:15 PM Cyber Crime Business Impacts Jason Vickery Sergeant, San Diego County Sheriff, Computer & High-Tech Crimes Task Force Collect and Discuss Questionnaire Highlights Alan Watkins Scott Brewer Overview of Upcoming Cyber Tabletop Exercises Alan Watkins Brendan Applegate Closing Remarks Alan Watkins Brendan Applegate 12:15 PM Adjourn Agenda 1
3 PROGRAM OVERVIEW Participant Guide Program Introduction In 2012, the City of San Diego established a partnership with the Naval Postgraduate School to develop and conduct a comprehensive community-based cyber security program. The intent of this program is to take the first step in developing a sustained regional initiative to address cyber threats to the greater San Diego area, by building on lessons learned from previous cyber programs conducted in Southern California. The San Diego Cyber Security Threat Awareness, Response, and Recovery Program (C- STARR) is a regional program that focuses on the cyber threat to the small business community. In order to accomplish this, C-STARR has been organized into a progressive series of training and exercise events. These events build from awareness and prevention to consequence management, and culminate with the response to a catastrophic attack on critical infrastructure. As the first event in the C-STARR program, the aims to establish a learning environment in which participants can build an understanding of current and developing cyber threats. Targeting private sector management and information technology (IT) professionals, the workshop features regional subject matter experts who will address the following topics, critical to the cyber protection of small- to medium-sized businesses: Cyber attack methods Recent attack case studies Cyber crime detection and prevention Information sharing and protection During the Workshop, participants will complete a Cyber Security Questionnaire that will allow the planning team to identify critical cyber-related issues and concerns. The Questionnaire will serve as a self-evaluation of regional capabilities in cyber security. Specific issues and concerns can then be addressed by the C-STARR planning team in development of exercise scenarios and follow-on plans and initiatives for the region. The will be held at the War Memorial Building, in Balboa Park, on Wednesday, December 5, Tabletop Exercise #1 The first of two Tabletop Exercises (TTX) will focus on the effects and consequences of a cyber attack that affects a number of small businesses. Participants will be divided into breakout groups by their business sector to evaluate regional capabilities to respond to and recover from a power grid failure scenario. The TTX will focus on identifying regional Program Overview 2
4 capabilities available in both the public and private sectors, and on the development of best practices and recommendations for improvement in the following areas: Assessing and managing technical, administrative, and financial impacts Cyber forensics and investigative processes Consequence management Ensuring continuity of business The first Tabletop Exercise will be held at the San Diego Operational Area Emergency Operations Center (EOC) on Wednesday, January 30, Tabletop Exercise #2 Building from lessons learned and critical issues from the first TTX, the second exercise will examine the response and recovery issues surrounding a widespread cyber attack on critical regional infrastructure. Whereas the first exercise focused on the capabilities of individual businesses to respond and recover from a cyber attack, the second will include elements of regional emergency response and consequence management, as a result of widespread damage or degradation of critical infrastructure. Participants will utilize in-place plans and procedures to evaluate regional capabilities to perform the following critical functions: Intrusion detection and mitigation Damage assessment and immediate response Consequence management and recovery Public information and preparedness measures The second Tabletop Exercise will be held at the San Diego Operational Area Emergency Operations Center (EOC) on Wednesday, February 27, Cyber Security Annex Upon completion of the program, observations, recommendation, best practices, and lessons learned will be leveraged to develop a functional annex to the County of San Diego s Operational Area Emergency Plan. This annex will formalize the County s organization and plans to respond to the cyber threat and recover from a large-scale cyber incident. The Cyber Security Annex will also identify regional capabilities, specialized resources, and will define specific roles and responsibilities, in the public and private sector. The C-STARR program is hosted by the City of San Diego and the Securing Our ecity Foundation, through a Homeland Security grant, and is planned and conducted in conjunction with the Naval Postgraduate School s Center for Asymmetric Warfare. Program Overview 3
5 Program Objectives The C-STARR program is intended to be the first step in a sustained regional initiative to improve cyber preparedness in the greater San Diego area, and increase regional capabilities to detect, respond to, and recover from widespread cyber attacks on critical infrastructure and the private sector. Pursuing this intent, the C-STARR planning team has identified the following program objectives: 1. Increase awareness and understanding of current and developing cyber threats and vulnerabilities 2. Examine the consequences of a widespread cyber attack on San Diego critical infrastructure and the private sector 3. Explore the role of the private sector in identifying, countering, and responding to a criminal or terrorist cyber attack 4. Identify actions that can be taken by the private sector and local government to increase cyber security and minimize the effects of cyber attacks 5. Identify future planning, training, and exercise requirements related to cyber crime and cyber security 6. Reinforce the communication and coordination of cyber-related information and intelligence between the private sector, local government, intelligence community, law enforcement, and first responders 7. Explore the ability of local, community, and agency-specific plans to prevent, mitigate, respond to, and recover from a cyber attack 8. Incorporate program recommendations and best practices into a Cyber Security Annex of the San Diego Operational Area Emergency Plan Points of Contact For further information on the C-STARR program, please consult one of the following points of contact: Alan Watkins Program Manager, Regional Cyber Security Program [email protected] Phone: (619) Brendan Applegate Project Manager, Center for Asymmetric Warfare [email protected] Phone: (831) Program Overview 4
6 SPEAKER BIOGRAPHIES Honorable Mitch Dembin United States Magistrate Judge, Southern District of California Board of Directors, ESET Foundation Mitch Dembin was sworn in as a United States Magistrate Judge in the Southern District of California on March 18, Prior to his appointment, he was an Assistant U.S. Attorney in San Diego and served as the Cybercrime Coordinator for the office. Before that, he was the Chief Security Advisor for Microsoft Corporation, assisting Microsoft's business customers in creating and implementing strategic security plans. Participant Guide Prior to joining Microsoft, Mitch was the president of EvidentData, Inc., a firm specializing in computer forensics, digital evidence and computer security. Mitch served three different terms as an Assistant U.S. Attorney, spanning more than 15 years in San Diego and in Boston, and including 6 years as a supervisor. As a federal prosecutor, Mitch has specialized in prosecuting a variety of white collar crimes and, beginning in 1991, in investigating and prosecuting high technology crimes. Before his first term as an AUSA, Mitch was a staff attorney for the Securities and Exchange Commission in Washington, DC. Mitch is credited with having founded the San Diego Regional Computer Forensics Laboratory, a national prototype, which provides assistance to the federal, state and local law enforcement agencies serving San Diego and Imperial Counties. Mitch was raised in Brooklyn, New York, the son of a New York City Police Officer, and received a Bachelor's Degree from Brooklyn College of the City University of New York, and a Juris Doctor Degree from Western New England Law School, where he also served as Managing Editor of the Law Review. Ron Simmons Security Operations Manager, San Diego Gas & Electric Co. Mr. Simmons career started as a U.S. Navy Sonar Technician in In mid-1998, he left the Navy and moved into the information technology field. Since his departure from the U.S. Navy, Mr. Simmons has held multiple roles within information security while working in industries such as hosting, financial and insurance services, and most recently critical infrastructure. Since 2008, Mr. Simmons has worked for the Sempra Energy Utilities family of companies, first as the Incident Response and Forensics Speaker Biographies 5
7 Lead. In this role, he and his team have responsibility for the enterprise incident response and forensics of corporate IT infrastructure, as well as the multiple gas and electric controls networks. He now serves as the Security Operations Manager for SDG&E s Information Security Department, overseeing Incident Response and Forensics, Threat and Vulnerability Management, Production Support and Service, Enterprise Access Manager. Jason Vickery Sergeant, San Diego County Sheriff Computer & High-Tech Crimes Task Force Jason Vickery is a sergeant with the San Diego Sheriff s Department, where he has worked for the last eighteen years. His assignments have included detentions, patrol, and investigations. Jason is currently assigned as the Law Enforcement Coordinator for the Computer and Technology Crime High Tech Response Team (CATCH). Jason has a Bachelor s degree from the University of Nebraska Kearney and a Master s degree from the University of Phoenix. Speaker Biographies 6
8 Program Content 7
9 Program Content 8
10 Program Content 9
11 Program Content 10
12 Critical Infrastructure - Business Impacts Ron Simmons CISSP, GCIH, GCIA, GCFA 2002 San Diego Gas and Electric Co. and Southern California Gas Company. All copyright and trademark rights reserved. Program Content 11
13 Program Content 12
14 Program Content 13
15 Program Content 14
16 Program Content 15
17 Program Content 16
18 Program Content 17
19 Program Content 18
20 Program Content 19
21 Program Content 20
22 Program Content 21
23 Program Content 22
24 Program Content 23
25 Program Content 24
26 Program Content 25
27 Program Content 26
28 Program Content 27
29 Program Content 28
30 Program Content 29
31 Program Content 30
32 Program Content 31
33 Program Content 32
34 Program Content 33
35 Program Content 34
36 Program Content 35
37 Program Content 36
38 Program Content 37
39 Program Content 38
40 Naval Postgraduate School, Center for Asymmetric Warfare Web: The San Diego C-STARR Program has been planned and conducted in collaborative partnership with the Center for Asymmetric Warfare, a federal government operational research and field experimentation center aligned under the Naval Postgraduate School s Information Sciences Department. The Center for Asymmetric Warfare, or CAW, was established in 1999 to support military and civilian autorities in identifying, countering, and controlling the effects of asymmetric threats. Since its inception, CAW has matured into a recognized leader in its field, by developing comprehensive education, training, and exercise programs; technology integration, test, and evaluation programs; and capability assessment and improvement programs with its partners in research. Today, CAW is headquartered at Naval Base Ventura County, in Point Mugu, California, but maintains a global reach, conducting programs in 26 countries and U.S. protectorates around the world. CAW programs are a result of cooperative partnerships with organizations across a wide spectrum of jurisdictions, including the Department of Defense; local, state, and federal governments; private sector and non-governmental organizations; academia and national centers of excellence; and international governments. Harnessing the resources and expertise that comprise the Naval Postgraduate School, CAW maintains a unique set of capabilities to meet the research, assessment, or planning needs of any organization. For further information, please contact: Alan Jaeger Brendan Applegate Director and Principal Investigator Deputy Director for Planning Phone: (805) Phone: (831) [email protected] [email protected] Center for Asymmetric Warfare 39
Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems
Cyber Incident Annex Coordinating Agencies ITS-Information Technology Systems Support Agencies Mississippi Department of Homeland Security Mississippi Emergency Management Agency Mississippi Department
Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:
Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice
How To Hold A Public Safety Summit
PUBLIC SAFETY SUMMIT I Crime Prevention through Cooperative Policing and Best Practices Wednesday, January 16, 2013 Greetings, Thank you for taking time out of your busy schedule to attend today s Public
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
Technology Crime Services
Technology Crime Services Presentation Summary Cyber Safety for the Corporate world Challenges to Police how you can assist Making your company crime resistant Reporting Online crime Traditional Policing
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic
DHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010
CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior
Wednesday, March 11, 2015 8:00am to 4:30pm. Seats are filling fast, sign up today!
EVENT NOTICE Making the Business Case for Cybersecurity & Public-Private Sector Cooperation Wednesday, March 11, 2015 8:00am to 4:30pm Presented by: ISACA - Greater Hartford Chapter Guest Speaker: Judith
THE ALABAMA CHAPTER OF THE ASSOCIATION OF CERTIFIED FRAUD EXAMINERS AND THE UNIVERSITY OF ALABAMA @ BIRMINGHAM SCHOOL OF BUSINESS
THE ALABAMA CHAPTER OF THE ASSOCIATION OF CERTIFIED FRAUD EXAMINERS THE UNIVERSITY OF ALABAMA @ BIRMINGHAM SCHOOL OF BUSINESS DAY ONE Fraud Trends 2012 AND PRESENT OUR 5th ANNUAL TRAINING SEMINAR DATE:
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
Fast Facts About The Cyber Security Job Market
Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing
NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
Establishing a State Cyber Crimes Unit White Paper
Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center
Resume. Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918. University of Colorado Colorado Springs, Colorado
Resume Name: Address: Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918 Contact Information:[email protected] Current Position: Instructor University of Colorado Colorado
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
Safeguarding Elders & Dependent Adults. Against Abuse FIRST CONFERENCE IN SANTA MARIA. How Our Community Works to Prevent Elder Abuse
Safeguarding Elders & Dependent Adults Against Abuse FIRST CONFERENCE IN SANTA MARIA How Our Community Works to Prevent Elder Abuse Friday, August 26, 2011 8:30 a.m. Noon. Elwin Mussell Senior Center 510
IACLEA SPOTLIGHT SAN DIEGO COMMUNITY COLLEGE DISTRICT POLICE DEPARTMENT
Name of Agency: San Diego Community College District Police Department Name of Chief / Director: Chief Charlie Hogquist Name / email for Point of Contact: Public College, Sworn Armed (39) Unarmed (18)
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Challenges in Cybersecurity. Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard
Challenges in Cybersecurity Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard Agenda National Perspectives & Background WA State Cyber Planning Steady State/Significant
SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS
1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase
Georgia Department of Education Career Pathway Descriptions
Law, Public Safety, Corrections & Security Cluster Planning, managing, and providing legal, public safety, protective services and homeland security, including professional and technical support services.
Cybersecurity Workforce Opportunities
Cybersecurity Workforce Opportunities RI Defense Economy Planning Commission 6 May 2015 The Rhode Island Defense Sector Innovation Focused - Economic Generator The Cybersecurity Need Growing Exponentially
Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy
Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee
U.S. Department of Homeland Security STATEMENT
U.S. Department of Homeland Security STATEMENT OF PAUL M. KILCOYNE DEPUTY ASSISTANT DIRECTOR OF INVESTIGATIVE SERVICES DIVISION U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT U.S. DEPARTMENT OF HOMELAND SECURITY
Homeland Security Major
Homeland Security Major Zach Wexman, Onye Chi-ukpai, Daniel Rapcsak, John Jackson Prior to the attacks of 9/11, a degree in Homeland Security was non-existent. The U.S. isn t only vulnerable to political
Presidents Reception with Vendors 6:00pm 8:00pm EXHIBIT HALL C
WESTERN STATES SHERIFF S ASSOCIATION ANNUAL CONFERNECE AND BUSNESS MEETING 2014 CONFERENCE AGENDA Sunday, February 16 TH, Afternoon Meetings. Executive Board Meeting 3:00pm 4:30pm Committee Meetings 4:30pm
STATEMENT OF DAVID A. O NEIL ACTING ASSISTANT ATTORNEY GENERAL CRIMINAL DIVISION UNITED STATES DEPARTMENT OF JUSTICE BEFORE THE
STATEMENT OF DAVID A. O NEIL ACTING ASSISTANT ATTORNEY GENERAL CRIMINAL DIVISION UNITED STATES DEPARTMENT OF JUSTICE BEFORE THE COMMITTEE ON OVERSIGHT & GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT OPERATIONS
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
JAMES R. SWAUGER Digital Forensic Examiner
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 726 East Main Street, Suite F #150 Lebanon, Ohio 45036 Phone: 866.246.2794 x703 Email: [email protected] CERTIFICATIONS
Douglas M. DePeppe Cyberlaw Attorney
Douglas M. DePeppe Cyberlaw Attorney [email protected] Cyber Risk Services Cyber Space Cyber Law International Cyber Frameworks IP Litigation George Washington University Law School, LL.M. The Judge Advocate
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Gila County Superior Court Judge Bryan B. Chambers
Gila County Superior Court Judge Bryan B. Chambers Judge Bryan B. Chambers On July 13, 2015, Bryan B. Chambers was appointed by Arizona Governor, Douglas A. Ducey, to fill the unexpired term of Judge Peter
GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
A Statewide Training Conference Agenda DOMESTIC VIOLENCE - Ending Violence: Assessing Victim Safety and Addressing Victims Needs
A Statewide Training Conference Agenda DOMESTIC VIOLENCE - Ending Violence: Assessing Victim Safety and Addressing Victims Needs Sponsored by United States Attorneys for the Eastern, Middle, and Western
Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down
Program Organizer: Please join us for a NEW Invitation Only Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down Role of Firm Leadership, IT, COO, General Counsel Data Breaches Identification
GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS
GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS THE TEAM William Beer São Paulo William Beer brings over 25 years of diverse international consulting experience advising on and managing
2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
CHATHAM COUNTY DEPARTMENT OF FAMILY AND CHILDREN S SERVICES
Georgia s Statewide Family Drug Treatment Court Training CHATHAM COUNTY DEPARTMENT OF FAMILY AND CHILDREN S SERVICES 761 Wheaton Street Savannah, Georgia 31498-1301 (912) 651-2216 February 8-9, 2012 This
Written Statement of Richard Dewey Executive Vice President New York Independent System Operator
Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman
Promoting Best Practices for Prosecuting Violence Against Women Crimes
Promoting Best Practices for Prosecuting Violence Against Women Crimes March 25, 20ll Embassy Suites Montgomery, Alabama Sponsored by Office of Prosecution Services Alabama District Attorneys Association
NASCIO 2014 State IT Recognition Awards
NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos
Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative [email protected] (302) 831 1580
Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative [email protected] (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP
2015 CEO & Board University Cybersecurity on the Rise Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf
CRIMINAL JUSTICE. Master of Arts. Master of Science HOMELAND SECURITY. Graduate PROGRAMS
Master of Arts CRIMINAL JUSTICE Master of Science HOMELAND SECURITY Graduate PROGRAMS M onmouth University s Criminal Justice and Homeland Security graduate programs are designed to provide students with
December 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of
Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.
Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency
Emergency Response Symposium 2016: Regional Response to Terror
Emergency Response Symposium 2016: Regional Response to Terror Presented by the Maryland-National Capital Region Emergency Response System Thursday, May 26, 2016 9:00 AM-4:00 PM Marriott College Park Conference
DHS, National Cyber Security Division Overview
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
v. 03/03/2015 Page ii
The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course
Curriculum Vita. Director, Bachelor of Arts Criminal Justice. University of Colorado. Colorado Springs, Colorado
Curriculum Vita Name: Address: Current Position: Michael E. Martinez 1420 Austin Bluffs Parkway School of Public Affairs Colorado Springs, Colorado Senior Instructor Director Bachelor of Arts in Criminal
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral
Emergency Support Function 14 Long-Term Community Recovery and Mitigation
ESF Coordinator: Grant County Emergency Management Primary Agencies: Grant County Emergency Management Grant County Assessor s Office Grant County Public Works Grant County Building Department Support
JOHN DAVIDSON WOODWARD, JR.
JOHN DAVIDSON WOODWARD, JR. Professor of the Practice of International Relations The Frederick S. Pardee School of Global Studies, Boston University 152 Bay State Road, Boston, MA 02215 E-mail: [email protected]
STATE OF MARYLAND Strategy for Homeland Security
STATE OF MARYLAND Strategy for Homeland Security Published June 2004 Governor s Office of Homeland Security Dennis R. Schrader, Director Robert L. Ehrlich, Jr. Governor Michael S. Steele Lt. Governor HOMELAND
Purpose of the Governor s strategy. Guiding Principles
Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose
B E F O R E T H E E M E R G E N C Y
B E F O R E T H E E M E R G E N C Y RESPONSIBILITY / LIABILITY for Homeland Security / Emergency Management Duty of Care - Counties and Cities ARE responsible for the safety of their citizens. Following
Gregg Gerber. Strategic Engagement, Emerging Markets
Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected]
WILLIAM OETTINGER PHONE (702) 292-4645 [email protected] SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
I. MISSION STATEMENT. Ensure a comprehensive public health and medical response following a disaster or emergency. SCOPE AND POLICIES
ESF 8 Public Health and Medical Services Coordinating Agency: Health Department Coordinating Agency Cooperating Agencies Health Department Fire and Rescue Department Police Department Office of the County
Working with the FBI
Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement
How To Understand The Cost Of The Death Penalty In California
ACADEMIC VITA JAMES G. LARSON Professor Chair, Department of Professional Studies School of Professional Studies National University EDUCATION: 1995 Juris Doctor Thomas Jefferson School of Law 1987 Bachelor
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
Bio Summary and CV. curriculum vitae of John C. Villines; Introduction; page 1 of 5 (rev Jan 2013)
Bio Summary and CV John Villines has dedicated his adult life to security, investigations and crime prevention. He has maintained a company license (Security and Investigations) in Georgia for approximately
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
Office of Homeland Security
Office of Homeland Security City Council City Manager OFFICE OF HOMELAND SECURITY Mitigation Program Preparedness Program Recovery Program Response Program Mission Statement To establish and maintain a
2014 Montana Government IT Conference. Securing Data Networks and People
Presenter: Matt Bennett, Genetec Leveraging the Cloud for Hybrid Video Surveillance Matt is based in Seattle, WA and is the Western North America pre-sales engineer for Genetec (the world s leader in unified
SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
Flooding Emergency Response Exercise
Flooding Emergency Response Exercise James Woodward, Senior Exercise Planner California Emergency Management Agency 3650 Schriever Ave. Mather, CA 95655 Cell: (916) 439-3546 Email: [email protected]
Cyber Security Risk Management
Our Ref.: B1/15C B9/29C 15 September 2015 The Chief Executive All Authorized Institutions Dear Sir/Madam, Cyber Security Risk Management I am writing to draw your attention to the growing importance of
Addressing letter to district attorney honorable: career test for college students
lusteric jail inmate find sample consultation letter to lawyer why we wear thumb ring private-equity fonds htp investments b.v Congratulations official letter retirement large block letter stencils minecraft
SAMPLE COURSE SYLLABUS*
DSS CENTER FOR DEVELOPMENT OF SECURITY EXCELLENCE (CDSE) EDUCATION DIVISION Managing a DoD Installation Security Program ED 507 SAMPLE COURSE SYLLABUS* A. DESCRIPTION The 2007 Defense Installations Plan
NIMS ICS 100.HCb. Instructions
NIMS ICS 100.HCb Instructions This packet contains the NIMS 100 Study Guide and the Test Questions for the NIMS 100 final exam. Please review the Study Guide. Next, take the paper test - record your answers
NIST Cybersecurity Framework & A Tale of Two Criticalities
NIST Cybersecurity Framework & A Tale of Two Criticalities Vendor Management & Incident Response Presented by: John H Rogers, CISSP Advisory Services Practice Manager [email protected] Presented
Lessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 150 Industrial Drive Franklin, Ohio 45005 Phone: 866.246.2794 x703 Email: [email protected] CERTIFICATIONS AND
