Take My Cash, Please. aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) (only be sure always to call it, please, research)

Size: px
Start display at page:

Download "Take My Cash, Please. aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) (only be sure always to call it, please, research)"

Transcription

1 Take My Cash, Please (only be sure always to call it, please, research) aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) The SaTC Team: Nina Amla, Chris Cli.on, Jeremy Epstein, Sol Greenspan, Anita Nikolich, Victor Piotrowski, Andrew Pollington, Deborah Shands, Gerry Tian, Ralph Wachter, and Heng Xu

2 What is SaTC? Ø NSF s flagship research program for research in cybersecurity Ø Primarily targeted at US colleges & universities Ø Also open to US non-profits, and sometimes for-profits Ø Non-US organizations can be subcontractors Ø $80+M in FY14 grant cycle Ø ~650 currently active grants, including many that supported work presented at this conference Ø FY15 grant cycle already underway

3 SaTC Actual FY14 Funding Areas (128 new research projects) Access control Anti-malware Anticensorship Applied cryptography Authentication Cellphone network security Citizen science Cloud security Cognitive psychology Competitions Cryptographic theory Cyber physical systems Cybereconomics Cyberwar Digital currencies Education Forensics Formal methods Governance Hardware security Healthcare security Insider threat Intrusion detection Mobile security Network security Operating systems Personalization Privacy Provenance Security usability Situational awareness Smart Grid Social networks Sociology of security Software security Vehicle security Verifiable computation Voting systems security Web security 3

4 SaTC includes many pieces Base solicita+on (old , new ) NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) (14-571) Dear Colleague LeLers SaTC EAGERs Enabling New Collabora+ons Between Computer and Social Scien+sts (14-016) [deadline passed] Research on Privacy in Today's Networked World (14-021) Cybersecurity Educa+on EAGERs - Pushing the Dimensions of the Domain (14-075) [deadline passed] Special Guidelines for Submi[ng Collabora+ve Proposals under the US NSF/CISE/SaTC US- Israel BSF Interna+onal Opportunity (14- TBD) new for FY15 SaTC par+cipates in CAREER CISE Research Ini+a+on Ini+a+ve (CRII) Others s+ll to come!

5 SaTC Perspectives Ø Ø Ø SaTC contains four 'perspectives' under which proposals can be submitted: Ø Trustworthy Computing Systems Ø Social, Behavioral, and Economic sciences (SBE) Ø STARSS (hardware) Ø Cybersecurity Education Proposals can be submitted to one or more perspectives with certain limits One is designated as 'primary' Ø The primary perspective affects which NSF Directorate will most closely examine the proposal

6 Sizes & Schedule (NSF Solicitation ) Amount & duration Transition Option Permitted? Submission window # FY14 funded Small Up to $500k, 3 years Yes Jan Jan proposals/ 52 projects Medium Up to $1.2M, 4 years Yes Oct Nov proposals/ 20 projects Large Up to $3M, 5 years Yes Nov Nov (New) Cybersecurity Education Up to $300K, 2 years No Dec Dec proposals/ 8 projects 6

7 Up to $100K/year for 3 years for Israeli collaborator with US researchers Collabora/ve Target areas are Proposals cyber-physical under systems the US security, NSF/CISE/ privacy, secure software, and cryptography SaTC No Israeli US- Israel researcher BSF may Interna/onal be on more than Opportunity two proposals, (14-104) and no more than one award Proposals submitted to NSF and BSF, with each proposal including both budgets Reviews by NSF; BSF will follow NSF decisions

8 New CISE/SBE Collabora/ons Goal: Start collaboration between computer scientists and social scientists who have not previously worked together Two phase process: Ø Submit white paper by March Ø If accepted, submit EAGER proposal (8 pages, up to $300K) Search NSF for details

9 Dear Colleague LeKer: Research on Privacy in Today's Networked World

10 Cybersecurity Education EAGERs Pushing the Dimensions of the Domain Goal: Encourage advances in cybersecurity education Up to $300K / 2 years Two phase process: Submit white paper If accepted, submit EAGER proposal (8 pages, up to $300K) New for FY15 Submission deadline for first phase: Aug Selections: Sep Full proposals: Sep Details at

11 NSF/Intel Partnership on Cyber-Physical Systems Security & Privacy Ideas lab to develop concepts & teams held in DC area Aug (by invitation) Full proposals due Oct (Ideas Lab participation NOT required) Two sizes: Synergy (up to $3M/3 yrs, jointly funded by Intel & NSF) Breakthrough (up to $500K/3 yrs, NSF only) Webinar June 2pm-3pm Eastern (recorded) cntn_id=131795&org=cise Solicitation at Total $8M funding

12 Aspiring PI Meeting Goal: For PIs who have been unsuccessful at winning SaTC awards; help understand what makes for a successful submission Held Aug 2014 at USENIX Security Organized by Rebecca Wright from Rutgers/DIMACS Slides and videos available at

13 So how do I get on SaTC-announce? To be notified of releases: subscribe SaTC-announce -> listserv@listserv.nsf.gov

14 CRII: CISE Research Initiation Initiative Goal: Pre-CAREER funding for faculty in 1 st two years after starting academic position (CISE-wide, not SaTC only) No longer required! $175K for students and equipment Eligibility: US citizen, permanent resident, or National No prior awards as PI (including CAREER or EAGER) from a Federal agency (state/local/private/foundation/subcontract are OK) Must be at US college or university, but tenure track NOT required Research positions are eligible Applications due Sep More info at Webinar July 28 th FAQ at

15 Washington Area Trustworthy Computing Hour (WATCH) Notifications: subscribe WATCH-announce -> All previous talks at Recent and upcoming WATCH talks (all recorded): May : Dan Wallach, Rice University on voting Jul : Crispin Cowan, Microsoft on learning to build secure software Nov : Dana Chisnell, UsabilityWorks on usable passwords Jan 15, Salil Vadhan, Harvard on privacy Mar 19, Geoffrey Williams, Airbus on security in aircraft cyber physical systems Apr 16, Gabriella Coleman, McGill on anthropology of hackers and civic activists Jun 18, Bret Hartman, Cisco on Internet of Things security directions from a commercial perspective Jul 16, Mary Ellen Callahan, Jenner & Block LLP (former Chief Privacy Officer, DHS) on lessons learned as a CPO

16 Want to be a panelist on an NSF panel? Good reasons to be a panelist: Learn what makes a good proposal; serve the community with your expertise! Bad reasons to be a panelist: Money! (a few hundred $ + airfare for reviewing 8-10 proposals and spending 1-2 days in Arlington VA) Eligibility: faculty, industry, government, postdocs Non-US people can attend in person or by phone; expenses are paid but no honoraria Send a list of topic areas you re interested/qualified to review to jepstein@nsf.gov Can t review for the same program/size as you submit (e.g., if submit a SaTC Medium, can review SaTC Small but not SaTC Medium) No guarantee that you ll get selected!

17 Want to be an NSF Program Officer? Help set the direction for security & privacy research! Rotators from universities and other non-profits are most common Must be from a US institution, but citizenship not required For academics, after tenure For others, 10+ years past PhD is most common PhD is typical but NOT required (e.g., me!) Typical stay is 2-3 years; max 4 years (except permanent govt employees) Talk to me!

18 And now for something different (NOT NSF-sponsored!) + = Want one? Send to password@epsteinmania.com

19 Jeremy Epstein Secure and Trustworthy Cyberspace (SaTC) Program Computer & Network Systems Division

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST

More information

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007

More information

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network

More information

NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security)

NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) NSF Webinar on NSF Solicita9on 14-571 NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) Farnam Jahanian, Keith Marzullo, Angelos D. Keromy9s, David Corman Jeremy Epstein,

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of

More information

Computing & Telecommunications Services Monthly Report March 2015

Computing & Telecommunications Services Monthly Report March 2015 March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex helpdesk@wright.edu www.wright.edu/cats/ Last Modified

More information

Ashley Institute of Training Schedule of VET Tuition Fees 2015

Ashley Institute of Training Schedule of VET Tuition Fees 2015 Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2%

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2% SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2% Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong

More information

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017 From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days

More information

Analysis One Code Desc. Transaction Amount. Fiscal Period

Analysis One Code Desc. Transaction Amount. Fiscal Period Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

Welcome to the NSF Webinar on our newest solicitation on hardware security.

Welcome to the NSF Webinar on our newest solicitation on hardware security. Welcome to the NSF Webinar on our newest solicitation on hardware security. I am Keith Marzullo, the division director of the Computer Network Systems division at NSF. And seated next to me is Celia Merzbacher,

More information

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation

More information

Important Dates Calendar 2014-2015 FALL

Important Dates Calendar 2014-2015 FALL Important Dates Calendar 204-205 FALL Rev. 6-8-4 st 8 H st 0 2nd 0 st 5 2nd 5 3rd 5 LSC Advanced Registration Begins May 27 May 27 May 27 May 27 May 27 May 27 May 27 May 27 May 27 Returning Students Advanced

More information

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

FY 2015 Schedule at a Glance

FY 2015 Schedule at a Glance Coaching and Mentoring for Excellence Oct 21 23, 2014 $2,950 Residential Coaching and Mentoring for Excellence Apr 7 9, 2015 $2,400 Non-residential Coaching and Mentoring for Excellence May 27 29, 2015

More information

DHS BUDGET REQU~ST FOR FY 2015-2016

DHS BUDGET REQU~ST FOR FY 2015-2016 DHS BUDGET REQU~ST FOR FY 2015-2016 ($ Amounts in Thousands) Page # of Governor's Executive Budget: APPROPRIATION: Pp. C1.8, E30.5, E30.16, E30.17 Payment to Federal Govt. - Medicare Drug Progr~m l. SUMMARY

More information

Grand Challenges, Federal Priorities and Funding an NSF/CISE view

Grand Challenges, Federal Priorities and Funding an NSF/CISE view Grand Challenges, Federal Priorities and Funding an NSF/CISE view Jim Kurose Assistant Director, NSF Computer & Information Science & Engineering Distinguished Professor College of Information and Computer

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity 18 November 2015 grance@nist.gov cyberframework@nist.gov National Institute of Standards and Technology About NIST NIST s mission is to develop

More information

How to Create Your Own Search & Development Proposals

How to Create Your Own Search & Development Proposals National Science Foundation Support for Social, Behavioral & Economic Sciences: Funding Opportunities and Tips Amber Story, Ph.D. Deputy Division Director Behavioral and Cognitive Sciences Division 2010

More information

Reviewing Brazilian International Collaboration Programs on IT: Challenges and Lessons Learned. Lisandro Zambenedetti Granville

Reviewing Brazilian International Collaboration Programs on IT: Challenges and Lessons Learned. Lisandro Zambenedetti Granville Reviewing Brazilian International Collaboration Programs on IT: Challenges and Lessons Learned Lisandro Zambenedetti Granville Outline Reviewing project calls and topics Selection and assisting project

More information

Learning and Learning Environments. Broadening Par2cipa2on in STEM. STEM Professional Workforce

Learning and Learning Environments. Broadening Par2cipa2on in STEM. STEM Professional Workforce Learning and Learning Environments Broadening Par2cipa2on in STEM STEM Professional Workforce Learning and Learning Environments Develop understanding of the founda3ons of STEM learning; emerging contexts

More information

Choosing a Cell Phone Plan-Verizon

Choosing a Cell Phone Plan-Verizon Choosing a Cell Phone Plan-Verizon Investigating Linear Equations I n 2008, Verizon offered the following cell phone plans to consumers. (Source: www.verizon.com) Verizon: Nationwide Basic Monthly Anytime

More information

CAFIS REPORT 2015.10

CAFIS REPORT 2015.10 CAFIS REPORT 2015.10 INDEX Message CAFIS Inbound 03-06 07-08 CAFIS Arch 09-10 CAFIS Brain 11-12 CAFIS Global 13-14 What We Do 15-16 About CAFIS 17-18 Services for Member Stores 19-34 Services for Card

More information

Mary Ellen Seale National Protection and Programs Directorate May 16, 2012

Mary Ellen Seale National Protection and Programs Directorate May 16, 2012 Finding & Integrating CyberTech in the U.S. Government Mary Ellen Seale National Protection and Programs Directorate May 16, 2012 Obtaining Federal Funding Understanding the Landscape Contracting Small

More information

WEATHERHEAD EXECUTIVE EDUCATION COURSE CATALOG

WEATHERHEAD EXECUTIVE EDUCATION COURSE CATALOG 2016 WEATHERHEAD EXECUTIVE EDUCATION COURSE CATALOG APPRECIATIVE INQUIRY COMMUNICATION AND PROFESSIONAL SKILLS EMOTIONAL INTELLIGENCE FINANCIAL DECISION MAKING DESIGNING INNOVATION AND STRATEGY MANAGING

More information

Center for Infrastructure Assurance and Security

Center for Infrastructure Assurance and Security Center for Infrastructure Assurance and Security CIAS Background Founded in 2001 Part of the Institute for Cyber Security at UTSA Focus areas: Infrastructure Assurance Programs Cyber Security Training

More information

Funding Innovative Network and Cybersecurity Research

Funding Innovative Network and Cybersecurity Research Funding Innovative Network and Cybersecurity Research Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure May 2015 NSF Core Mission: Fundamental Research Fundamental

More information

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf

More information

Master of Cyber Security

Master of Cyber Security Master of Cyber Security Dr. Winnie Callahan Assoc. Director, Informatics Meghan Balding Graduate & Professional Programs September 17, 2013 WebEx Quick Facts Will I be able to get a copy of the slides

More information

How to Apply for SBIR Impact NYC

How to Apply for SBIR Impact NYC Assistance for NYC Bio & Health Tech Ventures WEBINAR: How to Apply for SBIR Impact NYC August 18, 2015 Lisa M. Kurek Managing Partner BBC Entrepreneurial Training & Consulting LLC An initiative of www.sbirnyc.com

More information

Manchester City Council Report for Information. Managing Attendance (Real Time Absence Reporting)

Manchester City Council Report for Information. Managing Attendance (Real Time Absence Reporting) Manchester City Council Report for Information Report to: Subject: Overview and Scrutiny Human Resources Subgroup - 25 January 2011 Managing Attendance (Real Time Absence Reporting) Report of: Assistant

More information

Easter Seals Central Texas Programs Outcome Profiles Monthly and Year to Date FY 2011 85% 87% 80% 80% 84% 84% 83%

Easter Seals Central Texas Programs Outcome Profiles Monthly and Year to Date FY 2011 85% 87% 80% 80% 84% 84% 83% I. Outcomes Indicators for individuals receiving services: (Service Delivery Effectiveness) 85% 87% 80% 80% 84% 84% 83% A. Access Sep 10 Oct 10 Nov 10 YTD Dec 10 Jan 11 Feb 11 YTD Mar 11 Apr 11 May 11

More information

Summary of the State of Security

Summary of the State of Security Summary of the State of Security Tram Jewett, CISA CliftonLarsonAllen LLP Virginia GFOA Annual Spring Conference, 2016 1 1 Summary of the State of Security Tram Jewett, MS., CISA, 11 years IT audit and

More information

Insurance and Banking Subcommittee

Insurance and Banking Subcommittee Insurance and Banking Subcommittee Citizens Depopulation Update September 16, 2015 Christine Ashburn VP Communications, Legislative and External Affairs 2 3 Depopulation Customer Communications 1. 40 days

More information

PNNL Institutional Research Cloud Pilot WENDY COWLEY PNNL

PNNL Institutional Research Cloud Pilot WENDY COWLEY PNNL PNNL Institutional Research Cloud Pilot WENDY COWLEY PNNL Background Wendy Cowley Visual Analytics Researcher, National Security Directorate Project Management, software development 20+ years @ PNNL Interests

More information

Advisory User Group Meeting. October 18, 2011

Advisory User Group Meeting. October 18, 2011 Advisory User Group Meeting October 18, 2011 1 Agenda 11:30 Welcome Christine Lavoie 11:35 Session Objectives Christine Lavoie 11:40 USC s Research Administration System Christine Lavoie 11:50 Project

More information

The Center of Theological Inquiry In cooperation with The Program in Law and Public Affairs, Princeton University

The Center of Theological Inquiry In cooperation with The Program in Law and Public Affairs, Princeton University The Center of Theological Inquiry In cooperation with The Program in Law and Public Affairs, Princeton University Inquiry on Law and Religious Freedom for research scholars who welcome the dialogue between

More information

NSF Cybersecurity: Opportunities for Innovation. Anita Nikolich (CISE/ACI) Kevin Thompson (CISE/ACI) April, 2014

NSF Cybersecurity: Opportunities for Innovation. Anita Nikolich (CISE/ACI) Kevin Thompson (CISE/ACI) April, 2014 NSF Cybersecurity: Opportunities for Innovation Anita Nikolich (CISE/ACI) Kevin Thompson (CISE/ACI) April, 2014 NSF Cybersecurity Overview Cybersecurity Research Programs & Funding Opportunities Cybersecurity

More information

Great Grant Writing: Learning the Fundamentals of Effective Proposal Development

Great Grant Writing: Learning the Fundamentals of Effective Proposal Development Great Grant Writing: Learning the Fundamentals of Effective Proposal Development Jill Morris-IPR Grants Program Manager Jeff Agnoli-Education, Funding and Research Development-Office of the Vice President

More information

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013 Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 lagesse@uw.edu Summary Curriculum Vitae Employment I am a professor at the University

More information

Network Security Innovation Platform

Network Security Innovation Platform Technology Strategy Innovation Platform Andrew Tyrer Innovation Platform Manager Office of Science and Innovation DTI Innovation Platform Technology Programme ICT opportunities Andrew Tyrer Innovation

More information

employee condition in order to qualify for PIC cash payout? The company or the soleproprietorship? New!...9

employee condition in order to qualify for PIC cash payout? The company or the soleproprietorship? New!...9 Frequently Asked Questions on Cash Payout Option under the Productivity and Innovation Credit (PIC) Scheme ( PIC Cash Payout ) (Updated as at 19 Dec 2014) A1. Overview of the cash payout scheme... 3 1.

More information

Supervisor Instructions for Approving Web Time Entry

Supervisor Instructions for Approving Web Time Entry Supervisor Instructions for Approving Web Time Entry Time Approval Deadlines by Category Local 2110 Members members submit time by NOON on Monday of the pay week. Time should be approved no later than

More information

Security & privacy in the cloud; an easy road?

Security & privacy in the cloud; an easy road? Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands mvliem@microsoft.com THE SHIFT O L D W O R L D

More information

Danielle Supkis Cheek, CPA, CFE, CVA

Danielle Supkis Cheek, CPA, CFE, CVA EDUCATION Danielle Supkis Cheek, CPA, CFE, CVA www.supkischeek.com Danielle@SupkisCheek.com 701 N. Post Oak Rd. Suite 635 Houston, TX 77024 713-893-5625 University of Virginia, M.S. of Accountancy, Charlottesville,

More information

2013 2014 University-Wide Academic Calendar

2013 2014 University-Wide Academic Calendar 2013 2014 University-Wide Academic Calendar Guide to Abbreviations UGD = Undergraduate Day GS = Graduate Schools LAW = School of Law CPS = College of Professional Studies Aug 26 Monday LAW: Fall semester

More information

MAXIMIZE YOUR RECRUITING BUDGET

MAXIMIZE YOUR RECRUITING BUDGET RECRUITMENT MEDIA KIT 2015 MAXIMIZE YOUR RECRUITING BUDGET Target the Right Candidates REACH THE RIGHT PEOPLE AT THE RIGHT TIME In today s challenging tech hiring market with many available jobs and not

More information

RESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02

RESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02 RESEARCH CALL TO DOE/FEDERAL LABORATORIES Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02 CONTACT: Diane Hooie, Project Manager TELEPHONE NUMBER: (304) 285-4524 FAX NUMBER: (304)

More information

Computer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance

Computer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance Computer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance Presentation for the Seventh European Academic Conference on Internal Audit

More information

Digital Forensics Department- 2008 Report Submission Date: 08 th March 2009

Digital Forensics Department- 2008 Report Submission Date: 08 th March 2009 Digital Forensics Department- 2008 Report Submission Date: 08 th March 200 1.0 Introduction 2008 has been a very challenging year for Digital Forensics Department (DFD) with the increase of cases from

More information

The Five W's of SOC Operations. Kevin Young, @IT3700

The Five W's of SOC Operations. Kevin Young, @IT3700 The Five W's of SOC Operations Kevin Young, @IT3700 Thank you Todd Thanks to Randall Munroe https://xkcd.com/838/ Overview Introduction Five W s of SOC Operations When do I need a SOC? Readiness What exactly

More information

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity

In December 2011, the White House Office of Science. Introducing the federal cybersecurity R&D strategic plan. Leaping ahead on cybersecurity Introducing the federal cybersecurity R&D strategic plan Douglas Maughan, Bill Newhouse, and Tomas Vagoun In December 2011, the White House Office of Science and Technology Policy (OSTP) released the document,

More information

Energy Savings from Business Energy Feedback

Energy Savings from Business Energy Feedback Energy Savings from Business Energy Feedback Behavior, Energy, and Climate Change Conference 2015 October 21, 2015 Jim Stewart, Ph.D. INTRODUCTION 2 Study Background Xcel Energy runs the Business Energy

More information

Banner Employee Self-Service Web Time Entry. Student Workers User s Guide

Banner Employee Self-Service Web Time Entry. Student Workers User s Guide Banner Employee Self-Service Web Time Entry Student Workers User s Guide Table of Contents Introduction to Web Time Entry (WTE)... 1 Timeframe and Deadlines...1 Logging On....3 Access Time Sheet...5 Time

More information

Out of Many, One: Four Perspec4ves on Managing Limited Submission Programs

Out of Many, One: Four Perspec4ves on Managing Limited Submission Programs Out of Many, One: Four Perspec4ves on Managing Limited Submission Programs Pollyanne Frantz, Appalachian State University Kimberly Gray, Georgia Regents University Carol AshcraF, North Carolina State University

More information

Sage ERP MAS 90, 200, 200 SQL, and Sage ERP MAS 500. Supported Versions

Sage ERP MAS 90, 200, 200 SQL, and Sage ERP MAS 500. Supported Versions Sage ERP MAS 90, 200, 200 SQL, and Sage ERP MAS 500 Supported Versions Current Document: 2012... Page 1 Earlier Documents: 2011... Page 2 2010... Page 3 2009... Page 4 2008... Page 5 Sage ERP MAS 90, 200,

More information

Viterbi School of Engineering University of Southern California Fall 2015

Viterbi School of Engineering University of Southern California Fall 2015 DEN@Viterbi Viterbi School of Engineering University of Southern California Fall 2015 WebEx Quick Facts Will I be able to get a copy of the slides after the presentation? YES! How can I ask a question

More information

Consumer ID Theft Total Costs

Consumer ID Theft Total Costs Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially

More information

P/T 2B: 2 nd Half of Term (8 weeks) Start: 25-AUG-2014 End: 19-OCT-2014 Start: 20-OCT-2014 End: 14-DEC-2014

P/T 2B: 2 nd Half of Term (8 weeks) Start: 25-AUG-2014 End: 19-OCT-2014 Start: 20-OCT-2014 End: 14-DEC-2014 2014-2015 SPECIAL TERM ACADEMIC CALENDAR FOR SCRANTON EDUCATION ONLINE (SEOL), MBA ONLINE, HUMAN RESOURCES ONLINE, NURSE ANESTHESIA and ERP PROGRAMS SPECIAL FALL 2014 TERM Key: P/T = Part of Term P/T Description

More information

P/T 2B: 2 nd Half of Term (8 weeks) Start: 26-AUG-2013 End: 20-OCT-2013 Start: 21-OCT-2013 End: 15-DEC-2013

P/T 2B: 2 nd Half of Term (8 weeks) Start: 26-AUG-2013 End: 20-OCT-2013 Start: 21-OCT-2013 End: 15-DEC-2013 2013-2014 SPECIAL TERM ACADEMIC CALENDAR FOR SCRANTON EDUCATION ONLINE (SEOL), MBA ONLINE, HUMAN RESOURCES ONLINE, NURSE ANESTHESIA and ERP PROGRAMS SPECIAL FALL 2013 TERM Key: P/T = Part of Term P/T Description

More information

Cybersecurity Tips for Startups and Small Businesses

Cybersecurity Tips for Startups and Small Businesses FOUR ESSENTIAL Cybersecurity Tips for Startups and Small Businesses Cybercrime is a Big Problem for Small Business As you know, there s nothing small about the small business sector. According to the U.S.

More information

Detailed guidance for employers

Detailed guidance for employers April 2015 3 Detailed guidance for employers Appendix A: Pay reference periods This document accompanies: Detailed guidance no. 3 Assessing the workforce Pay reference period calendars where the definition

More information

P/T 2B: 2 nd Half of Term (8 weeks) Start: 24-AUG-2015 End: 18-OCT-2015 Start: 19-OCT-2015 End: 13-DEC-2015

P/T 2B: 2 nd Half of Term (8 weeks) Start: 24-AUG-2015 End: 18-OCT-2015 Start: 19-OCT-2015 End: 13-DEC-2015 2015-2016 SPECIAL TERM ACADEMIC CALENDAR For Scranton Education Online (SEOL), Masters of Business Administration Online, Masters of Accountancy Online, Health Administration Online, Health Informatics

More information

About CREST R&D Grant

About CREST R&D Grant 1 About CREST R&D Grant Philosophy Higher value Electrical & Electronics (E&E) economic sector can be achieved when R&D thrives in the ecosystem This can be accelerated by promoting collaborative research

More information

ACTIVE MICROSOFT CERTIFICATIONS:

ACTIVE MICROSOFT CERTIFICATIONS: Last Activity Recorded : May 30, 2014 Microsoft Certification ID : 375009 SUSANNE SCHNEIDER KAISERSTRASSE 53 REUTLINGEN, 72764 DE SUSANNE.SCHNEIDER@KIT-KOM.DE *Charter- Certification that was achieved

More information

Deep Security Vulnerability Protection Summary

Deep Security Vulnerability Protection Summary Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security

More information

University of Wisconsin System Strategic Initiatives

University of Wisconsin System Strategic Initiatives University of Wisconsin System Strategic Initiatives April 27,2015 Sasi K. Pillay UWSA CIO 1 Principles Mission Enablement Reduction of Risk Cost-effective Operations 2 The Four Tenets A. Elevate the Professionalism

More information

Introduction to the U.S. Federal Budget Process and R&D Investment

Introduction to the U.S. Federal Budget Process and R&D Investment Introduction to the U.S. Federal Budget Process and R&D Investment Patrick J Clemins April 27, 2010 for EEP s How Government Works AAAS R&D Budget and Policy Program http://www.aaas.org/spp/rd See the

More information

Federal Reserve System Secure Payments Task Force

Federal Reserve System Secure Payments Task Force 2015 Federal Reserve System. Materials are not to be used without Federal Reserve consent. Federal Reserve System Secure Payments Task Force Teleconference June 4, 2015 Secure Payments Task Force Anti-Trust

More information

3 rd Party Solar Sales April 2012

3 rd Party Solar Sales April 2012 3 rd Party Solar Sales April 2012 About SolarCity The Leading Solar Service Provider in the U.S. More than 30,000 projects completed or underway Serving thousands of markets nationwide AZ, CA, CO, DC,

More information

National Science Foundation 4201 Wilson Boulevard Arlington, Virginia 22230

National Science Foundation 4201 Wilson Boulevard Arlington, Virginia 22230 National Science Foundation 4201 Wilson Boulevard Arlington, Virginia 22230 NSF 15-057 Frequently Asked Questions (FAQ) about the Faculty Early Career Development (CAREER) Program for Submission in Years

More information

All information provided today, including a copy of this presentation is available on

All information provided today, including a copy of this presentation is available on Our role to support approved providers in meeting their reporting requirements, transferring of student debt information to the ATO and the calculation of student HELP entitlements. Now, your organisation

More information

Department of Public Welfare (DPW)

Department of Public Welfare (DPW) Department of Public Welfare (DPW) Office of Income Maintenance Electronic Benefits Transfer Card Risk Management Report Out-of-State Residency Review FISCAL YEAR 2012-2013 June 2013 (March, April and

More information

South Dakota Board of Regents. Web Time Entry. Student. Training Manual & User s Guide

South Dakota Board of Regents. Web Time Entry. Student. Training Manual & User s Guide South Dakota Board of Regents Web Time Entry Student Training Manual & User s Guide Web Time Entry Self Service Web Time Entry is a web-based time entry system designed to improve accuracy and eliminate

More information

Georgia Institute of Technology School of Civil and Environmental Engineering

Georgia Institute of Technology School of Civil and Environmental Engineering Georgia Institute of Technology School of Civil and Environmental Engineering Policies and Procedures for Reappointment, Promotion and Tenure February 6,. Scope The Committee on Reappointment, Promotion

More information

Craven County Information Technology Who are we?

Craven County Information Technology Who are we? Who are we? Made up of IT and GIS personnel Eight computer related professionals Five GIS (Geographic Information Systems) & Tax Mapping Professionals All working to provide employees and citizens a dependable,

More information

2015-2016 Communications Plan, Member Engagement Plan And Master Calendar

2015-2016 Communications Plan, Member Engagement Plan And Master Calendar 20-59(14C) Strategic Plan Implementation Support for the AASHTO Special Committee on Transportation Security and Emergency Management () 2015-2016 Communications Plan, Member Engagement Plan And Master

More information

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation Briefing Outline Overview of the CUI Program Establishment of the Program Elements of the CUI Executive Order Categories and Registry Handling CUI Current Efforts Implementation Plan CUI and IT Implementation

More information

Reducing Resident Readmissions: The Pierce County Medicaid Nursing Home Collaborative

Reducing Resident Readmissions: The Pierce County Medicaid Nursing Home Collaborative Reducing Resident Readmissions: The Pierce County Medicaid Nursing Home Collaborative April 2015 Overview The Washington State Department of Social & Health Services (DSHS) and Qualis Health engaged 14

More information

Trimble Navigation Limited (NasdaqGS:TRMB) > Public Ownership > Officials' Trading

Trimble Navigation Limited (NasdaqGS:TRMB) > Public Ownership > Officials' Trading Trimble Navigation Limited (NasdaqGS:TRMB) > Public Ownership > Officials' Trading Individual Trades Holder Name Trade Date Range Transacted Shares Transaction Value (USD) Transaction Type Price Range

More information

2015 Calendar of Events / Key dates

2015 Calendar of Events / Key dates Date Name Lead(s) Status January 11-15, 2015 Transportation Research Board 94th Annual Meeting X January 28, 2015 February 6, 2015 MWITE Board Teleconference Carrie Falkenrath March 6, 2015 Section Information

More information

ACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks

ACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks Session 1 Academic Calendar August 24, 2015 to October 17, 2015 Tuesday / Thursday, 5:30 pm to 8:30 pm M/W T/TH T/W TH S Saturday lab as scheduled Classes Begin 24-Aug 25-Aug 25-Aug 27-Aug 29-Aug NU205

More information

ACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks

ACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks Session 1 Academic Calendar August 24, 2015 to October 17, 2015 Tuesday / Thursday, 5:30 pm to 8:30 pm M/W T/TH T/W TH S Saturday lab as scheduled Classes Begin 24-Aug 25-Aug 25-Aug 27-Aug 29-Aug NU205

More information

Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison

Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison Deep Security/Intrusion Defense Firewall - IDS/IPS Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security and Intrusion Defense Firewall. The document

More information

Project Cost & Schedule Monitoring Process Using MS Excel & MS Project

Project Cost & Schedule Monitoring Process Using MS Excel & MS Project Project Cost & Schedule Monitoring Process Using MS Excel & MS Project Presented by: Rajesh Jujare About Us Solutions is founded with objectives a. To share its expertise and experiences to overcome the

More information

Competition Title: InfoSec Competition 2014. 1 P a g e

Competition Title: InfoSec Competition 2014. 1 P a g e Competition Title: InfoSec Competition 2014 1 P a g e Competition Vision Find Omani Talented youth in the field of Information Security and showcase their achievements through Oman National CERT Channels

More information

The Business Service Center. Job Candidate Certification (JCC) 2614 Kenhill Drive Bowie, Maryland 20715 410) 451-3283

The Business Service Center. Job Candidate Certification (JCC) 2614 Kenhill Drive Bowie, Maryland 20715 410) 451-3283 The Business Service Center Job Candidate Certification (JCC) 2614 Kenhill Drive Bowie, Maryland 20715 410) 451-3283 This page intentionally left blank Corporate Profiler Aerotek GEICO U.S. Dept of HUD

More information

Pennsylvania Home And Community Based Services (HCBS) Waiver Settings Transition Plan

Pennsylvania Home And Community Based Services (HCBS) Waiver Settings Transition Plan Section 1: Identification - Pennsylvania will use its statewide transition plan as a way to determine its compliance with CMS s rule on HCBS. Pennsylvania will determine the current level of what state

More information

Electric Energy and Power Panel Sessions

Electric Energy and Power Panel Sessions Electric Energy and Power Panel Sessions S.S. (Mani) Venkata University of Washington, Seattle, WA venkata@ee.washington.edu 520-820-8005 2011 ECEDHA Annual Conference Phoenix, AZ March 13, 2011 Background

More information

Call for 2014 Nominations

Call for 2014 Nominations Call for 2014 Nominations 2014 1 Celebrating the Excellence of America s Small Business The SCORE Awards is an annual event that celebrates the outstanding achievements of America s small businesses. Equal

More information

Cybersecurity at the Nexus of a Hyper- Connected World

Cybersecurity at the Nexus of a Hyper- Connected World Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major

More information

HEALTH INSURANCE EXCHANGES: FEDERAL DEADLINES AND STATE DECISIONS

HEALTH INSURANCE EXCHANGES: FEDERAL DEADLINES AND STATE DECISIONS HEALTH INSURANCE EXCHANGES: FEDERAL DEADLINES AND STATE DECISIONS Annual Meeting: Council of State Governments West July 21, 2012 BOB CAREY RLCAREY CONSULTING AGENDA 1 The Basics: Health Insurance Exchanges

More information

Gregory Milman National Institute of Allergy and Infectious Diseases gmilman@niaid.nih.gov May 7, 2012

Gregory Milman National Institute of Allergy and Infectious Diseases gmilman@niaid.nih.gov May 7, 2012 Secrets of NIH Small Business Grant Applications Gregory Milman National Institute of Allergy and Infectious Diseases gmilman@niaid.nih.gov May 7, 2012 Particularly Important Information Is Highlighted

More information

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information