New Challenges in Systems Safety - Themes

Slides:



Advertisements
Similar presentations
Applying the Human Views for MODAF to the conception of energy-saving work solutions Dr Anne Bruseberg Systems Engineering & Assessment Ltd, UK on behalf.
Advertisements

VISEUM UK PRESENTATION MAJOR SECURITY PROJECT ON TIME COMPLETION MANAGEMENT.
Unrestricted © Siemens AG All rights reserved. The Digital Factory – Enabling a Holistic Approach to Automation MIT Industrial IoT Workshop – October.
Supply Chain Development A step-change in Supply Chain performance 08/08/2015 OFFICIAL 1 Supply Chain Focus Group – 17 th September 2014 Vic Carlill.
Ethics Aspects Of Embedded And Cyber-Physical Systems Abhilash Thekkilakattil 1, Gordana Dodig-Crnkovic 1,2 1 Mälardalen University, Sweden 2 Chalmers.
Data mining, Video Content Analytics Moutzouris Tasos – EPI Systems 2 ο Techology Forum Παρασκευή 8 Μαΐου 2015.
The Yellow Group Design Informatics (Regli, Stone, Kusiak, Leifer, Gupta, Chung, Fenves, Law, Kopena)
@d_sight/DSight /company/d-sight Complex Decision-Making Made Easy.
Ontology Summit 2015 Track C Report-back Summit Synthesis Session 1, 19 Feb 2015.
Working Together To Protect Public Health: The Public Health Communications Infrastructure May 23, 2006 Janet B. Stevens Director, Management Controls.
ECARE+ FP7 Workshop “Full virtuality in aircraft development processes” PARAGON LTD Company Presentation Expression of Interest Harry Tsahalis - Head of.
Piemonte Workshop 1 11 September 2006 Paolo Salieri European Commission DG ENTR-H4 Security research in FP7.
Networked Embedded and Control Systems WP ICT Call 2 Objective ICT ICT National Contact Points Mercè Griera i Fisa Brussels, 23 May 2007.
2/16/06 Page 1Loui Some Notes from Sommerville Software Engineering 7 CS436 (material for quiz)
1 An initiative developed in the framework of the START project supported by the European Commission (DG InfSo) START IST SSA.
Tony Howard BEST and B&ES Meeting the Industry’s Skills Challenge in the New Training Landscape Apprenticeships & Direct Training 4 th November 2015.
1 Sean Davin Cyber and Defence Director. Solution 2 Nemesis – a “SOC In A Box” Security Operations Centre as an offline service for SMEs.
The 5th International Conference on Internet of Things 2015 Coex, Soeul, S. Korea Oct , 2015 Internet of Processes Vladimír Kebo, Center of Advanced.
NCP INFODAY, Brussels, 23 June 2010 NCP INFODAY, Brussels, 23 June 2010 Objective ICT EU-Brazil Research and Development cooperation Augusto.
UK Interest & Input to the Factories of the Future Horizon 2020 Roadmap. © ActionPlant 2011.
Keynote 9: Cyber Security in Emerging C4I Systems: Deployment and Implementation Perspectives By Eric J. Eifert, Sr. VP of DarkMatter’s Managed Security.
ARTEMIS SRA 2016 Trust, Security, Robustness, and Dependability Dr. Daniel Watzenig ARTEMIS Spring Event, Vienna April 13, 2016.
SRA 2016 – Strategic Research Challenges Design Methods, Tools, Virtual Engineering Jürgen Niehaus, SafeTRANS.
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
A paradigm shift in Supply Chain Management Semantic Web and the User Centric Supply Chain Kylie Armstrong Program Director – Next Generation Spatial infrastructures.
Second Congress The Business of Design and Engineering.
ASSESS Workgroups Aligning Commercial, Government and Research Joe Walsh, IntrinSIM Joe Walsh, intrinSIM Potential Game Changers Andreas Vlahinos, Advanced.
Surveillance and Security Systems Cyber Security Integration.
General information Targeted topics
Internal primer Transform Your Products
Emerging Trends in Nuclear Information Management
The Impact of Digital Labour on Outsourcing
Information Systems Security Technical Competences Center
INTRODUCTION TO SOFTWARE ENGINEERING
Penn State Center for e-Design Site Vision and Capabilities
Document No: GSC-21_034 Source: ISO/TC 184/SC 4 Industrial data
DEVELOPING A FRAMEWORK FOR BUSINESS ACTION ON WASH
Cyber Security: State of the Nation
Cyber Resilient Energy Delivery Consortium
ASSET - Automotive Software cyber SEcuriTy
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
SE and SSE Trade-Off Analyses
Collaborative R&D Cloud
Empowering worker capabilities through vision
Global Mapping of Industry 4.0 and Skills Industry Needs
How IIoT Makes Machines and Devices More Effective & Intelligent
Strategic Research Agenda
Dr Paul Lewis Chief Technology Officer
General information Organisation logo Targeted topics
1.
5G Security Training
Empowering worker capabilities through vision
Tessco Order Processing and Fulfillment Systems
A Must to Know - Testing IoT
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 21 March 2018.
David Sayago EU Research Funding Team Valorisation Centre.
Airmic Conference 2018 // Workshop B4
Digitalization of Manufacturing
Unit 3 Information Systems
Smart Learning concepts to enhance SMART Universities in Africa
I UNDERSTAND CONCEPTS OF CYBERSECURITY
CS385T Software Engineering Dr.Doaa Sami
Document No: GSC-21_034 Source: ISO/TC 184/SC 4 Industrial data
Cloud adoption NECOOST Advisory | June 2017.
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 26 September 2018.
GRC, A holistic Road Map for Information Security Transformation
Session 8: Innovative Uses of Captives: Cyber and Beyond
Virtual Singapore—3D digital platform enabling users from different sectors to develop sophisticated tools and applications for test-bedding concepts and.
Market Research Future +1 (339) (US) (UK) Human Capital Management (HCM) Market Research Report- Global Forecast 2022 In this.
Presentation transcript:

New Challenges in Systems Safety - Themes Better, Faster, Cheaper Resource constraints, organisational buy-in Move to Digital & Data In industry and also in safety engineering too Drive to digital working: NHS Digital 2020 (healthcare) Autonomy and data feed - traceability Access and Data Sharing To learn from practice (industry data) Ownership of data (eg. healthcare) Access to forensic data (eg. security) Cyber Interaction of physical and software security aspects Integration of systems (eg. parking system and flight control) Threats: intelligent, sophisticated and subtle: intermittent Complexity Aircraft, cloud, quantum, IOT, SoS Data explosion Integration, and supply chains Distributed autonomous decision making Autonomy Fast data feedback loops Trust and ethics

New Challenges in Systems Safety - Solutions Better, Faster, Cheaper Evidenced based practices Raise awareness of issues Move to Digital & Data SMART tooling Data Safety Guidance Specific guidance for data Access and Data Sharing More openness with sharing data or sharing abstracted versions Meta data for data to capture provenance and quality Cyber Raise awareness Corporate competencies Maturity assessments Active management (eg. pen testing, hashing algorithms) Complexity Explicitly modelling uncertainty Autonomy Agency model Testing against human decisions Standardisation