Take My Cash, Please. aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) (only be sure always to call it, please, research)
|
|
- Baldwin Daniel
- 8 years ago
- Views:
Transcription
1 Take My Cash, Please (only be sure always to call it, please, research) aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) The SaTC Team: Nina Amla, Chris Cli.on, Jeremy Epstein, Sol Greenspan, Anita Nikolich, Victor Piotrowski, Andrew Pollington, Deborah Shands, Gerry Tian, Ralph Wachter, and Heng Xu
2 What is SaTC? Ø NSF s flagship research program for research in cybersecurity Ø Primarily targeted at US colleges & universities Ø Also open to US non-profits, and sometimes for-profits Ø Non-US organizations can be subcontractors Ø $80+M in FY14 grant cycle Ø ~650 currently active grants, including many that supported work presented at this conference Ø FY15 grant cycle already underway
3 SaTC Actual FY14 Funding Areas (128 new research projects) Access control Anti-malware Anticensorship Applied cryptography Authentication Cellphone network security Citizen science Cloud security Cognitive psychology Competitions Cryptographic theory Cyber physical systems Cybereconomics Cyberwar Digital currencies Education Forensics Formal methods Governance Hardware security Healthcare security Insider threat Intrusion detection Mobile security Network security Operating systems Personalization Privacy Provenance Security usability Situational awareness Smart Grid Social networks Sociology of security Software security Vehicle security Verifiable computation Voting systems security Web security 3
4 SaTC includes many pieces Base solicita+on (old , new ) NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) (14-571) Dear Colleague LeLers SaTC EAGERs Enabling New Collabora+ons Between Computer and Social Scien+sts (14-016) [deadline passed] Research on Privacy in Today's Networked World (14-021) Cybersecurity Educa+on EAGERs - Pushing the Dimensions of the Domain (14-075) [deadline passed] Special Guidelines for Submi[ng Collabora+ve Proposals under the US NSF/CISE/SaTC US- Israel BSF Interna+onal Opportunity (14- TBD) new for FY15 SaTC par+cipates in CAREER CISE Research Ini+a+on Ini+a+ve (CRII) Others s+ll to come!
5 SaTC Perspectives Ø Ø Ø SaTC contains four 'perspectives' under which proposals can be submitted: Ø Trustworthy Computing Systems Ø Social, Behavioral, and Economic sciences (SBE) Ø STARSS (hardware) Ø Cybersecurity Education Proposals can be submitted to one or more perspectives with certain limits One is designated as 'primary' Ø The primary perspective affects which NSF Directorate will most closely examine the proposal
6 Sizes & Schedule (NSF Solicitation ) Amount & duration Transition Option Permitted? Submission window # FY14 funded Small Up to $500k, 3 years Yes Jan Jan proposals/ 52 projects Medium Up to $1.2M, 4 years Yes Oct Nov proposals/ 20 projects Large Up to $3M, 5 years Yes Nov Nov (New) Cybersecurity Education Up to $300K, 2 years No Dec Dec proposals/ 8 projects 6
7 Up to $100K/year for 3 years for Israeli collaborator with US researchers Collabora/ve Target areas are Proposals cyber-physical under systems the US security, NSF/CISE/ privacy, secure software, and cryptography SaTC No Israeli US- Israel researcher BSF may Interna/onal be on more than Opportunity two proposals, (14-104) and no more than one award Proposals submitted to NSF and BSF, with each proposal including both budgets Reviews by NSF; BSF will follow NSF decisions
8 New CISE/SBE Collabora/ons Goal: Start collaboration between computer scientists and social scientists who have not previously worked together Two phase process: Ø Submit white paper by March Ø If accepted, submit EAGER proposal (8 pages, up to $300K) Search NSF for details
9 Dear Colleague LeKer: Research on Privacy in Today's Networked World
10 Cybersecurity Education EAGERs Pushing the Dimensions of the Domain Goal: Encourage advances in cybersecurity education Up to $300K / 2 years Two phase process: Submit white paper If accepted, submit EAGER proposal (8 pages, up to $300K) New for FY15 Submission deadline for first phase: Aug Selections: Sep Full proposals: Sep Details at
11 NSF/Intel Partnership on Cyber-Physical Systems Security & Privacy Ideas lab to develop concepts & teams held in DC area Aug (by invitation) Full proposals due Oct (Ideas Lab participation NOT required) Two sizes: Synergy (up to $3M/3 yrs, jointly funded by Intel & NSF) Breakthrough (up to $500K/3 yrs, NSF only) Webinar June 2pm-3pm Eastern (recorded) cntn_id=131795&org=cise Solicitation at Total $8M funding
12 Aspiring PI Meeting Goal: For PIs who have been unsuccessful at winning SaTC awards; help understand what makes for a successful submission Held Aug 2014 at USENIX Security Organized by Rebecca Wright from Rutgers/DIMACS Slides and videos available at
13 So how do I get on SaTC-announce? To be notified of releases: subscribe SaTC-announce -> listserv@listserv.nsf.gov
14 CRII: CISE Research Initiation Initiative Goal: Pre-CAREER funding for faculty in 1 st two years after starting academic position (CISE-wide, not SaTC only) No longer required! $175K for students and equipment Eligibility: US citizen, permanent resident, or National No prior awards as PI (including CAREER or EAGER) from a Federal agency (state/local/private/foundation/subcontract are OK) Must be at US college or university, but tenure track NOT required Research positions are eligible Applications due Sep More info at Webinar July 28 th FAQ at
15 Washington Area Trustworthy Computing Hour (WATCH) Notifications: subscribe WATCH-announce -> All previous talks at Recent and upcoming WATCH talks (all recorded): May : Dan Wallach, Rice University on voting Jul : Crispin Cowan, Microsoft on learning to build secure software Nov : Dana Chisnell, UsabilityWorks on usable passwords Jan 15, Salil Vadhan, Harvard on privacy Mar 19, Geoffrey Williams, Airbus on security in aircraft cyber physical systems Apr 16, Gabriella Coleman, McGill on anthropology of hackers and civic activists Jun 18, Bret Hartman, Cisco on Internet of Things security directions from a commercial perspective Jul 16, Mary Ellen Callahan, Jenner & Block LLP (former Chief Privacy Officer, DHS) on lessons learned as a CPO
16 Want to be a panelist on an NSF panel? Good reasons to be a panelist: Learn what makes a good proposal; serve the community with your expertise! Bad reasons to be a panelist: Money! (a few hundred $ + airfare for reviewing 8-10 proposals and spending 1-2 days in Arlington VA) Eligibility: faculty, industry, government, postdocs Non-US people can attend in person or by phone; expenses are paid but no honoraria Send a list of topic areas you re interested/qualified to review to jepstein@nsf.gov Can t review for the same program/size as you submit (e.g., if submit a SaTC Medium, can review SaTC Small but not SaTC Medium) No guarantee that you ll get selected!
17 Want to be an NSF Program Officer? Help set the direction for security & privacy research! Rotators from universities and other non-profits are most common Must be from a US institution, but citizenship not required For academics, after tenure For others, 10+ years past PhD is most common PhD is typical but NOT required (e.g., me!) Typical stay is 2-3 years; max 4 years (except permanent govt employees) Talk to me!
18 And now for something different (NOT NSF-sponsored!) + = Want one? Send to password@epsteinmania.com
19 Jeremy Epstein Secure and Trustworthy Cyberspace (SaTC) Program Computer & Network Systems Division
SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
More informationCase 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
More informationAT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
More informationNSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security)
NSF Webinar on NSF Solicita9on 14-571 NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) Farnam Jahanian, Keith Marzullo, Angelos D. Keromy9s, David Corman Jeremy Epstein,
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCenters of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
More informationComputing & Telecommunications Services Monthly Report March 2015
March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex helpdesk@wright.edu www.wright.edu/cats/ Last Modified
More informationAshley Institute of Training Schedule of VET Tuition Fees 2015
Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-
More informationSECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2%
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2% Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong
More informationEnhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
More informationAnalysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
More informationNICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
More informationWelcome to the NSF Webinar on our newest solicitation on hardware security.
Welcome to the NSF Webinar on our newest solicitation on hardware security. I am Keith Marzullo, the division director of the Computer Network Systems division at NSF. And seated next to me is Celia Merzbacher,
More informationSECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
More informationImportant Dates Calendar 2014-2015 FALL
Important Dates Calendar 204-205 FALL Rev. 6-8-4 st 8 H st 0 2nd 0 st 5 2nd 5 3rd 5 LSC Advanced Registration Begins May 27 May 27 May 27 May 27 May 27 May 27 May 27 May 27 May 27 Returning Students Advanced
More informationRelease of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
More informationNational Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
More informationFY 2015 Schedule at a Glance
Coaching and Mentoring for Excellence Oct 21 23, 2014 $2,950 Residential Coaching and Mentoring for Excellence Apr 7 9, 2015 $2,400 Non-residential Coaching and Mentoring for Excellence May 27 29, 2015
More informationDHS BUDGET REQU~ST FOR FY 2015-2016
DHS BUDGET REQU~ST FOR FY 2015-2016 ($ Amounts in Thousands) Page # of Governor's Executive Budget: APPROPRIATION: Pp. C1.8, E30.5, E30.16, E30.17 Payment to Federal Govt. - Medicare Drug Progr~m l. SUMMARY
More informationGrand Challenges, Federal Priorities and Funding an NSF/CISE view
Grand Challenges, Federal Priorities and Funding an NSF/CISE view Jim Kurose Assistant Director, NSF Computer & Information Science & Engineering Distinguished Professor College of Information and Computer
More informationFramework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity 18 November 2015 grance@nist.gov cyberframework@nist.gov National Institute of Standards and Technology About NIST NIST s mission is to develop
More informationHow to Create Your Own Search & Development Proposals
National Science Foundation Support for Social, Behavioral & Economic Sciences: Funding Opportunities and Tips Amber Story, Ph.D. Deputy Division Director Behavioral and Cognitive Sciences Division 2010
More informationReviewing Brazilian International Collaboration Programs on IT: Challenges and Lessons Learned. Lisandro Zambenedetti Granville
Reviewing Brazilian International Collaboration Programs on IT: Challenges and Lessons Learned Lisandro Zambenedetti Granville Outline Reviewing project calls and topics Selection and assisting project
More informationLearning and Learning Environments. Broadening Par2cipa2on in STEM. STEM Professional Workforce
Learning and Learning Environments Broadening Par2cipa2on in STEM STEM Professional Workforce Learning and Learning Environments Develop understanding of the founda3ons of STEM learning; emerging contexts
More informationChoosing a Cell Phone Plan-Verizon
Choosing a Cell Phone Plan-Verizon Investigating Linear Equations I n 2008, Verizon offered the following cell phone plans to consumers. (Source: www.verizon.com) Verizon: Nationwide Basic Monthly Anytime
More informationCAFIS REPORT 2015.10
CAFIS REPORT 2015.10 INDEX Message CAFIS Inbound 03-06 07-08 CAFIS Arch 09-10 CAFIS Brain 11-12 CAFIS Global 13-14 What We Do 15-16 About CAFIS 17-18 Services for Member Stores 19-34 Services for Card
More informationMary Ellen Seale National Protection and Programs Directorate May 16, 2012
Finding & Integrating CyberTech in the U.S. Government Mary Ellen Seale National Protection and Programs Directorate May 16, 2012 Obtaining Federal Funding Understanding the Landscape Contracting Small
More informationWEATHERHEAD EXECUTIVE EDUCATION COURSE CATALOG
2016 WEATHERHEAD EXECUTIVE EDUCATION COURSE CATALOG APPRECIATIVE INQUIRY COMMUNICATION AND PROFESSIONAL SKILLS EMOTIONAL INTELLIGENCE FINANCIAL DECISION MAKING DESIGNING INNOVATION AND STRATEGY MANAGING
More informationCenter for Infrastructure Assurance and Security
Center for Infrastructure Assurance and Security CIAS Background Founded in 2001 Part of the Institute for Cyber Security at UTSA Focus areas: Infrastructure Assurance Programs Cyber Security Training
More informationFunding Innovative Network and Cybersecurity Research
Funding Innovative Network and Cybersecurity Research Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure May 2015 NSF Core Mission: Fundamental Research Fundamental
More informationCENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR
JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf
More informationMaster of Cyber Security
Master of Cyber Security Dr. Winnie Callahan Assoc. Director, Informatics Meghan Balding Graduate & Professional Programs September 17, 2013 WebEx Quick Facts Will I be able to get a copy of the slides
More informationHow to Apply for SBIR Impact NYC
Assistance for NYC Bio & Health Tech Ventures WEBINAR: How to Apply for SBIR Impact NYC August 18, 2015 Lisa M. Kurek Managing Partner BBC Entrepreneurial Training & Consulting LLC An initiative of www.sbirnyc.com
More informationManchester City Council Report for Information. Managing Attendance (Real Time Absence Reporting)
Manchester City Council Report for Information Report to: Subject: Overview and Scrutiny Human Resources Subgroup - 25 January 2011 Managing Attendance (Real Time Absence Reporting) Report of: Assistant
More informationEaster Seals Central Texas Programs Outcome Profiles Monthly and Year to Date FY 2011 85% 87% 80% 80% 84% 84% 83%
I. Outcomes Indicators for individuals receiving services: (Service Delivery Effectiveness) 85% 87% 80% 80% 84% 84% 83% A. Access Sep 10 Oct 10 Nov 10 YTD Dec 10 Jan 11 Feb 11 YTD Mar 11 Apr 11 May 11
More informationSummary of the State of Security
Summary of the State of Security Tram Jewett, CISA CliftonLarsonAllen LLP Virginia GFOA Annual Spring Conference, 2016 1 1 Summary of the State of Security Tram Jewett, MS., CISA, 11 years IT audit and
More informationInsurance and Banking Subcommittee
Insurance and Banking Subcommittee Citizens Depopulation Update September 16, 2015 Christine Ashburn VP Communications, Legislative and External Affairs 2 3 Depopulation Customer Communications 1. 40 days
More informationPNNL Institutional Research Cloud Pilot WENDY COWLEY PNNL
PNNL Institutional Research Cloud Pilot WENDY COWLEY PNNL Background Wendy Cowley Visual Analytics Researcher, National Security Directorate Project Management, software development 20+ years @ PNNL Interests
More informationAdvisory User Group Meeting. October 18, 2011
Advisory User Group Meeting October 18, 2011 1 Agenda 11:30 Welcome Christine Lavoie 11:35 Session Objectives Christine Lavoie 11:40 USC s Research Administration System Christine Lavoie 11:50 Project
More informationThe Center of Theological Inquiry In cooperation with The Program in Law and Public Affairs, Princeton University
The Center of Theological Inquiry In cooperation with The Program in Law and Public Affairs, Princeton University Inquiry on Law and Religious Freedom for research scholars who welcome the dialogue between
More informationNSF Cybersecurity: Opportunities for Innovation. Anita Nikolich (CISE/ACI) Kevin Thompson (CISE/ACI) April, 2014
NSF Cybersecurity: Opportunities for Innovation Anita Nikolich (CISE/ACI) Kevin Thompson (CISE/ACI) April, 2014 NSF Cybersecurity Overview Cybersecurity Research Programs & Funding Opportunities Cybersecurity
More informationGreat Grant Writing: Learning the Fundamentals of Effective Proposal Development
Great Grant Writing: Learning the Fundamentals of Effective Proposal Development Jill Morris-IPR Grants Program Manager Jeff Agnoli-Education, Funding and Research Development-Office of the Vice President
More informationCurriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013
Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 lagesse@uw.edu Summary Curriculum Vitae Employment I am a professor at the University
More informationThe Importance of Being Earnest(ly Secure) Jeremy Epstein Na<onal Science Founda<on September 17 2015
The Importance of Being Earnest(ly Secure) Jeremy Epstein Na
More informationNetwork Security Innovation Platform
Technology Strategy Innovation Platform Andrew Tyrer Innovation Platform Manager Office of Science and Innovation DTI Innovation Platform Technology Programme ICT opportunities Andrew Tyrer Innovation
More informationemployee condition in order to qualify for PIC cash payout? The company or the soleproprietorship? New!...9
Frequently Asked Questions on Cash Payout Option under the Productivity and Innovation Credit (PIC) Scheme ( PIC Cash Payout ) (Updated as at 19 Dec 2014) A1. Overview of the cash payout scheme... 3 1.
More informationSupervisor Instructions for Approving Web Time Entry
Supervisor Instructions for Approving Web Time Entry Time Approval Deadlines by Category Local 2110 Members members submit time by NOON on Monday of the pay week. Time should be approved no later than
More informationSecurity & privacy in the cloud; an easy road?
Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands mvliem@microsoft.com THE SHIFT O L D W O R L D
More informationDanielle Supkis Cheek, CPA, CFE, CVA
EDUCATION Danielle Supkis Cheek, CPA, CFE, CVA www.supkischeek.com Danielle@SupkisCheek.com 701 N. Post Oak Rd. Suite 635 Houston, TX 77024 713-893-5625 University of Virginia, M.S. of Accountancy, Charlottesville,
More information2013 2014 University-Wide Academic Calendar
2013 2014 University-Wide Academic Calendar Guide to Abbreviations UGD = Undergraduate Day GS = Graduate Schools LAW = School of Law CPS = College of Professional Studies Aug 26 Monday LAW: Fall semester
More informationMAXIMIZE YOUR RECRUITING BUDGET
RECRUITMENT MEDIA KIT 2015 MAXIMIZE YOUR RECRUITING BUDGET Target the Right Candidates REACH THE RIGHT PEOPLE AT THE RIGHT TIME In today s challenging tech hiring market with many available jobs and not
More informationRESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02
RESEARCH CALL TO DOE/FEDERAL LABORATORIES Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02 CONTACT: Diane Hooie, Project Manager TELEPHONE NUMBER: (304) 285-4524 FAX NUMBER: (304)
More informationComputer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance
Computer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance Presentation for the Seventh European Academic Conference on Internal Audit
More informationDigital Forensics Department- 2008 Report Submission Date: 08 th March 2009
Digital Forensics Department- 2008 Report Submission Date: 08 th March 200 1.0 Introduction 2008 has been a very challenging year for Digital Forensics Department (DFD) with the increase of cases from
More informationThe Five W's of SOC Operations. Kevin Young, @IT3700
The Five W's of SOC Operations Kevin Young, @IT3700 Thank you Todd Thanks to Randall Munroe https://xkcd.com/838/ Overview Introduction Five W s of SOC Operations When do I need a SOC? Readiness What exactly
More informationIn December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity
Introducing the federal cybersecurity R&D strategic plan Douglas Maughan, Bill Newhouse, and Tomas Vagoun In December 2011, the White House Office of Science and Technology Policy (OSTP) released the document,
More informationEnergy Savings from Business Energy Feedback
Energy Savings from Business Energy Feedback Behavior, Energy, and Climate Change Conference 2015 October 21, 2015 Jim Stewart, Ph.D. INTRODUCTION 2 Study Background Xcel Energy runs the Business Energy
More informationBanner Employee Self-Service Web Time Entry. Student Workers User s Guide
Banner Employee Self-Service Web Time Entry Student Workers User s Guide Table of Contents Introduction to Web Time Entry (WTE)... 1 Timeframe and Deadlines...1 Logging On....3 Access Time Sheet...5 Time
More informationOut of Many, One: Four Perspec4ves on Managing Limited Submission Programs
Out of Many, One: Four Perspec4ves on Managing Limited Submission Programs Pollyanne Frantz, Appalachian State University Kimberly Gray, Georgia Regents University Carol AshcraF, North Carolina State University
More informationSage ERP MAS 90, 200, 200 SQL, and Sage ERP MAS 500. Supported Versions
Sage ERP MAS 90, 200, 200 SQL, and Sage ERP MAS 500 Supported Versions Current Document: 2012... Page 1 Earlier Documents: 2011... Page 2 2010... Page 3 2009... Page 4 2008... Page 5 Sage ERP MAS 90, 200,
More informationViterbi School of Engineering University of Southern California Fall 2015
DEN@Viterbi Viterbi School of Engineering University of Southern California Fall 2015 WebEx Quick Facts Will I be able to get a copy of the slides after the presentation? YES! How can I ask a question
More informationConsumer ID Theft Total Costs
Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially
More informationP/T 2B: 2 nd Half of Term (8 weeks) Start: 25-AUG-2014 End: 19-OCT-2014 Start: 20-OCT-2014 End: 14-DEC-2014
2014-2015 SPECIAL TERM ACADEMIC CALENDAR FOR SCRANTON EDUCATION ONLINE (SEOL), MBA ONLINE, HUMAN RESOURCES ONLINE, NURSE ANESTHESIA and ERP PROGRAMS SPECIAL FALL 2014 TERM Key: P/T = Part of Term P/T Description
More informationP/T 2B: 2 nd Half of Term (8 weeks) Start: 26-AUG-2013 End: 20-OCT-2013 Start: 21-OCT-2013 End: 15-DEC-2013
2013-2014 SPECIAL TERM ACADEMIC CALENDAR FOR SCRANTON EDUCATION ONLINE (SEOL), MBA ONLINE, HUMAN RESOURCES ONLINE, NURSE ANESTHESIA and ERP PROGRAMS SPECIAL FALL 2013 TERM Key: P/T = Part of Term P/T Description
More informationCybersecurity Tips for Startups and Small Businesses
FOUR ESSENTIAL Cybersecurity Tips for Startups and Small Businesses Cybercrime is a Big Problem for Small Business As you know, there s nothing small about the small business sector. According to the U.S.
More informationDetailed guidance for employers
April 2015 3 Detailed guidance for employers Appendix A: Pay reference periods This document accompanies: Detailed guidance no. 3 Assessing the workforce Pay reference period calendars where the definition
More informationP/T 2B: 2 nd Half of Term (8 weeks) Start: 24-AUG-2015 End: 18-OCT-2015 Start: 19-OCT-2015 End: 13-DEC-2015
2015-2016 SPECIAL TERM ACADEMIC CALENDAR For Scranton Education Online (SEOL), Masters of Business Administration Online, Masters of Accountancy Online, Health Administration Online, Health Informatics
More informationAbout CREST R&D Grant
1 About CREST R&D Grant Philosophy Higher value Electrical & Electronics (E&E) economic sector can be achieved when R&D thrives in the ecosystem This can be accelerated by promoting collaborative research
More informationACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : May 30, 2014 Microsoft Certification ID : 375009 SUSANNE SCHNEIDER KAISERSTRASSE 53 REUTLINGEN, 72764 DE SUSANNE.SCHNEIDER@KIT-KOM.DE *Charter- Certification that was achieved
More informationDeep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
More informationUniversity of Wisconsin System Strategic Initiatives
University of Wisconsin System Strategic Initiatives April 27,2015 Sasi K. Pillay UWSA CIO 1 Principles Mission Enablement Reduction of Risk Cost-effective Operations 2 The Four Tenets A. Elevate the Professionalism
More informationIntroduction to the U.S. Federal Budget Process and R&D Investment
Introduction to the U.S. Federal Budget Process and R&D Investment Patrick J Clemins April 27, 2010 for EEP s How Government Works AAAS R&D Budget and Policy Program http://www.aaas.org/spp/rd See the
More informationFederal Reserve System Secure Payments Task Force
2015 Federal Reserve System. Materials are not to be used without Federal Reserve consent. Federal Reserve System Secure Payments Task Force Teleconference June 4, 2015 Secure Payments Task Force Anti-Trust
More information3 rd Party Solar Sales April 2012
3 rd Party Solar Sales April 2012 About SolarCity The Leading Solar Service Provider in the U.S. More than 30,000 projects completed or underway Serving thousands of markets nationwide AZ, CA, CO, DC,
More informationNational Science Foundation 4201 Wilson Boulevard Arlington, Virginia 22230
National Science Foundation 4201 Wilson Boulevard Arlington, Virginia 22230 NSF 15-057 Frequently Asked Questions (FAQ) about the Faculty Early Career Development (CAREER) Program for Submission in Years
More informationAll information provided today, including a copy of this presentation is available on
Our role to support approved providers in meeting their reporting requirements, transferring of student debt information to the ATO and the calculation of student HELP entitlements. Now, your organisation
More informationDepartment of Public Welfare (DPW)
Department of Public Welfare (DPW) Office of Income Maintenance Electronic Benefits Transfer Card Risk Management Report Out-of-State Residency Review FISCAL YEAR 2012-2013 June 2013 (March, April and
More informationSouth Dakota Board of Regents. Web Time Entry. Student. Training Manual & User s Guide
South Dakota Board of Regents Web Time Entry Student Training Manual & User s Guide Web Time Entry Self Service Web Time Entry is a web-based time entry system designed to improve accuracy and eliminate
More informationGeorgia Institute of Technology School of Civil and Environmental Engineering
Georgia Institute of Technology School of Civil and Environmental Engineering Policies and Procedures for Reappointment, Promotion and Tenure February 6,. Scope The Committee on Reappointment, Promotion
More informationCraven County Information Technology Who are we?
Who are we? Made up of IT and GIS personnel Eight computer related professionals Five GIS (Geographic Information Systems) & Tax Mapping Professionals All working to provide employees and citizens a dependable,
More information2015-2016 Communications Plan, Member Engagement Plan And Master Calendar
20-59(14C) Strategic Plan Implementation Support for the AASHTO Special Committee on Transportation Security and Emergency Management () 2015-2016 Communications Plan, Member Engagement Plan And Master
More informationBriefing Outline. Overview of the CUI Program. CUI and IT Implementation
Briefing Outline Overview of the CUI Program Establishment of the Program Elements of the CUI Executive Order Categories and Registry Handling CUI Current Efforts Implementation Plan CUI and IT Implementation
More informationReducing Resident Readmissions: The Pierce County Medicaid Nursing Home Collaborative
Reducing Resident Readmissions: The Pierce County Medicaid Nursing Home Collaborative April 2015 Overview The Washington State Department of Social & Health Services (DSHS) and Qualis Health engaged 14
More informationTrimble Navigation Limited (NasdaqGS:TRMB) > Public Ownership > Officials' Trading
Trimble Navigation Limited (NasdaqGS:TRMB) > Public Ownership > Officials' Trading Individual Trades Holder Name Trade Date Range Transacted Shares Transaction Value (USD) Transaction Type Price Range
More information2015 Calendar of Events / Key dates
Date Name Lead(s) Status January 11-15, 2015 Transportation Research Board 94th Annual Meeting X January 28, 2015 February 6, 2015 MWITE Board Teleconference Carrie Falkenrath March 6, 2015 Section Information
More informationACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks
Session 1 Academic Calendar August 24, 2015 to October 17, 2015 Tuesday / Thursday, 5:30 pm to 8:30 pm M/W T/TH T/W TH S Saturday lab as scheduled Classes Begin 24-Aug 25-Aug 25-Aug 27-Aug 29-Aug NU205
More informationACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks
Session 1 Academic Calendar August 24, 2015 to October 17, 2015 Tuesday / Thursday, 5:30 pm to 8:30 pm M/W T/TH T/W TH S Saturday lab as scheduled Classes Begin 24-Aug 25-Aug 25-Aug 27-Aug 29-Aug NU205
More informationDeep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison
Deep Security/Intrusion Defense Firewall - IDS/IPS Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security and Intrusion Defense Firewall. The document
More informationProject Cost & Schedule Monitoring Process Using MS Excel & MS Project
Project Cost & Schedule Monitoring Process Using MS Excel & MS Project Presented by: Rajesh Jujare About Us Solutions is founded with objectives a. To share its expertise and experiences to overcome the
More informationCompetition Title: InfoSec Competition 2014. 1 P a g e
Competition Title: InfoSec Competition 2014 1 P a g e Competition Vision Find Omani Talented youth in the field of Information Security and showcase their achievements through Oman National CERT Channels
More informationThe Business Service Center. Job Candidate Certification (JCC) 2614 Kenhill Drive Bowie, Maryland 20715 410) 451-3283
The Business Service Center Job Candidate Certification (JCC) 2614 Kenhill Drive Bowie, Maryland 20715 410) 451-3283 This page intentionally left blank Corporate Profiler Aerotek GEICO U.S. Dept of HUD
More informationPennsylvania Home And Community Based Services (HCBS) Waiver Settings Transition Plan
Section 1: Identification - Pennsylvania will use its statewide transition plan as a way to determine its compliance with CMS s rule on HCBS. Pennsylvania will determine the current level of what state
More informationElectric Energy and Power Panel Sessions
Electric Energy and Power Panel Sessions S.S. (Mani) Venkata University of Washington, Seattle, WA venkata@ee.washington.edu 520-820-8005 2011 ECEDHA Annual Conference Phoenix, AZ March 13, 2011 Background
More informationCall for 2014 Nominations
Call for 2014 Nominations 2014 1 Celebrating the Excellence of America s Small Business The SCORE Awards is an annual event that celebrates the outstanding achievements of America s small businesses. Equal
More informationCybersecurity at the Nexus of a Hyper- Connected World
Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major
More informationHEALTH INSURANCE EXCHANGES: FEDERAL DEADLINES AND STATE DECISIONS
HEALTH INSURANCE EXCHANGES: FEDERAL DEADLINES AND STATE DECISIONS Annual Meeting: Council of State Governments West July 21, 2012 BOB CAREY RLCAREY CONSULTING AGENDA 1 The Basics: Health Insurance Exchanges
More informationGregory Milman National Institute of Allergy and Infectious Diseases gmilman@niaid.nih.gov May 7, 2012
Secrets of NIH Small Business Grant Applications Gregory Milman National Institute of Allergy and Infectious Diseases gmilman@niaid.nih.gov May 7, 2012 Particularly Important Information Is Highlighted
More informationDeep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison
Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison
More information3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
More information