Homeland Security Institute Homeland Security Institute Overview and Issues for DIMACS Workshop Gary G. Nelson Senior Researcher.

Slides:



Advertisements
Similar presentations
Building open regional innovation strategies: New opportunities provided by Smart Specialisation Strategies Claire Nauwelaers Independent STI policy expert.
Advertisements

Towards the Romania of PRINCIPLES OF PROGRAMMING The social and macroeconomic policy of Europe is the policy of Romania EU projects represent a.
Transit Security: An Overview of Activities Since 9/11 Eva Lerner-Lam President Palisades Consulting Group, Inc. ITE 2003 Annual Meeting August 24-27,
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Wade E. Kline, AICP Community Development Planner.
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
DHS, National Cyber Security Division Overview
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Greg Shaw How do we turn private sector preparedness into an investment rather than a cost of doing.
1 Preparing Washington for a Changing Climate An Integrated Climate Change Response Strategy Department of Ecology Hedia Adelsman, Executive Policy Advisor.
ISS IT Assessment Framework
U.S. Department of the Interior U.S. Geological Survey Tom Armstrong Senior Advisor for Global Change Programs U.S. Geological Survey
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Building Public Health / Clinical Health Information Exchanges: The Minnesota Experience Marty LaVenture, MPH, PhD Director, Center for Health Informatics.
Emergency Management & Homeland Security Interface Samuel Musa National Defense University.
Course Overview B290 Fall 2014 What is a strategy? Context / Environment Political Regulatory Technological Resources Skills Knowledge Assets Capital.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
China and space security National Defense University, PLA, China National Defense University, PLA, China Zhong Jing.
SEPRI University of Massachusetts Amherst Security, Emergency Preparedness, and Response Institute SEPRI “Integrating Solutions Providing Real Time Connectivity”
Strengthening the quality of research for policy engagement in the African context – achievements and aspirations Tebogo B. Seleka Botswana Institute for.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
United States Coast Guard Port Security Assessment Program Evaluability Assessment LaKeshia Allen Alexandra Sommers May 2, 2005.
October 27, 2005 Contra Costa Operational Area Homeland Security Strategic and Tactical Planning and Hazardous Materials Response Assessment Project Overview.
© 2014 The MITRE Corporation. All rights reserved. Greg Nelson June 23, 2014 Aviation Safety Information Analysis and Sharing (ASIAS) Overview.
Hazard Resilient Coastal Community Index Keelin Kuipers WAS*IS Workshop II March 13, 2006.
Baltic Sea Region Programme EU:s strategi för Östersjöregionen, hur nära relation? -Större vikt, mer medel? -Ryssland, Vitryssland -Större roll,
International Telecommunication Union ICTs and Climate Change Adaptation Angelica V Ospina, University of Manchester, UK Cristina Bueti, International.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
PREVENTION & RESPONSE “ARE YOU PREPARED” Security & Emergency Management Conference 1 June 2006 FA Frank Prendergast National Manager Counter Terrorism.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
Enterprise Risk Management (ERM) ABN AMRO Business Unit North America (BU NA) Overview for ERM Committee April 11, 2007.
National Science Foundation 1 Evaluating the EHR Portfolio Judith A. Ramaley Assistant Director Education and Human Resources.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Critical Infrastructure Protection: Program Overview
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Virginia Local Government IT Executives (VALGITE) April 26, 2010 Bruce Sturk & Leslie Fuentes – City of Hampton.
Homeland Security Grant Program 2015 Process Michelle Hanneken Illinois Emergency Management Agency.
Transfer of Chile’s Puente Program to the Caribbean: Background and Methodology Francisco Pilotti, Director Department of Social Development and Employment.
Strategic framework – a framework for change and growth Improve Infrastructure and Organisation Integrated systems and digital capabilities Aligned and.
Identifying the Impacts of Technology Transfer Beyond Commercialization FPTT National Meeting, June 12, 2007.
“Integrating Property Management with Emergency Recovery” Ivonne Bachar, CPPM CF Director, Property Management Office Stanford University
Economic and Social Commission for Asia and the Pacific ESCAP-ISDR Consultation Meeting on Coastal and Climate Hazards 17–18 September 2009 ESCAP Trust.
CREATING THE FUTURE Challenges and Opportunities for ICT in Education and Development Patti Swarts, GeSCI Africa Regional Programme Manager TPD Workshop,
Mark Luker, Vice President, EDUCAUSE EDUCAUSE Cyberinfrastructure.
Proprietary Information of BearingPoint Inc. | Copyright 2005 BearingPoint Inc. All rights reserved. America’s First National Critical Infrastructure Exercise.
Enterprise Cybersecurity Strategy
Created by: Ashley Spivey For Department of Homeland Security All information from:
Planning for the Unexpected … Research Organization & Mechanisms Dr. Mel Ciment Consultant
New Mexico State University Land-Grant System Accountability: Learning from the CSREES Portfolio Review Process Steven Loring Assistant Director Agricultural.
Office of Public Health Preparedness and Response Division of Emergency Operations Centers for Disease Control and Prevention.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e 1 Air Force Energy Policy 1 Formally established the AF Energy Program: Strategy, Goals, Objectives.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
U N I T E D S T A T E S D E P A R T M E N T O F C O M M E R C E N A T I O N A L O C E A N I C A N D A T M O S P H E R I C A D M I N I S T R A T I O N.
OutcomeObjectivesResearch questionsOutputs Activities Smallholder families adopt technology packages that improve food, nutrition and income security 1.To.
Tools for Mainstreaming Disaster Risk Reduction: Guidance Notes for Development Organisations Charlotte Benson and John Twigg Presented by Margaret Arnold.
Scaling the Not-For-Profit Difference March 14, 2016.
SEC 480 assist Expect Success/sec480assistdotcom FOR MORE CLASSES VISIT
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
1 Office of ASG/CITO Crisis Information Management Strategy UNGIWG-11, Geneva 15 March 2011 A written consent by the UN is required to use the information.
Mgt Project Portfolio Management and the PMO Module 8 - Fundamentals of the Program Management Office Dr. Alan C. Maltz Howe School of Technology.
Crisis management related research at
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Integrated Management System and Certification
California Cybersecurity Integration Center (Cal-CSIC)
Transit Security Training and Education Overview
The National Network of
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
The U.S. Department of Homeland Security
Presentation transcript:

Homeland Security Institute Homeland Security Institute Overview and Issues for DIMACS Workshop Gary G. Nelson Senior Researcher September 29, 2004

Homeland Security Institute DIMACS 9/29/04 2 Duties: 1.Systems/risk analysis, modeling… 2.Economic and policy analysis… 3.Evaluation of effectiveness… 4.Identification of common standards… 5.Assistance in establishing testbeds 6.Metrics of effectiveness 7.Design/support exercises & simulations 8.Strategic technology development plans Background on HSI HSI Federally Funded Research and Development Center (FFRDC) Arlington, VAHSI Federally Funded Research and Development Center (FFRDC) Arlington, VA Competitively Awarded to ANSER HomelandSecurity Act of 2002 Sec. 312 HomelandSecurity Act of 2002 Sec. 312 FY04ResearchPlan FY05ResearchPlan

Homeland Security Institute DIMACS 9/29/04 3 Domain Integration Engage Stakeholders Challenge Assumptions

Homeland Security Institute DIMACS 9/29/04 4 Integrated/Systems Approach SPONSOR GOALS Stimulate development and acquisition of new systems with homeland security value. Effective Resource Allocation Improve the homeland security value of existing systems—focus on Critical Infrastructures and Key Resources. Operations Deployment Acquisition System Development Technology Development Research Portfolio Trades End-to-End Analyses Life-Cycle Analyses

Homeland Security Institute DIMACS 9/29/04 5 Multi-Dimensional Outreach Strategy “Force Multipliers” Stakeholders

Homeland Security Institute DIMACS 9/29/04 6 Our Vulnerable Assets Connecting to Workshop Issues Networks: Objects+Links  Emergence Networks: Objects+Links  Emergence DecisionNetworks(logical) PhysicalNetworks Actions (physical state change) Their Risk Decisions Our Risk Decisions Our Security Their Attack Prevent Information on physical state (limits) Information (limits)

Homeland Security Institute DIMACS 9/29/04 7 Disrupt their physical attack pathway Identify our physical vulnerabilities Make our security (prevent, protect) pathways robust Make effective security decisions –Many scales (programming to incident response) –Collaboratively (resource contention) –Robustly (with risk) –Adaptively (evo-devo) What are we Trying to Do? Communication of relevant physical state Communication of critical physical activations

Homeland Security Institute DIMACS 9/29/04 8 You: resource--Problem: utilization Systems approach: organize resources into capabilities! –Apply the theory, but how? A decision network problem –Collaboration of program planners, operators and researchers…all of whom suffer significant and mutual information limits –Risk: establish robust programs given significant external information limits A bias –Great focus on information-communications –Not enough on decision support applications and techniques

Homeland Security Institute DIMACS 9/29/04 9 Outlook HSI will be one of the foci of collaborations –FY05 consultancies and subcontracts –Tasks focused on network/decision approaches We can make leaps with “dual benefit” –Exploit the modeling and sensing of the physical network –Exploit modeling of the logical network –Exploit the great leap in open-systems communications (while protecting that physical asset)