Dr. Paul Losiewicz Senior Scientific Advisor Cyber Security and Information Systems Information Analysis Center (CSIAC)

Slides:



Advertisements
Similar presentations
Capacity Building for Repositories Dr. Helena Asamoah-Hassan University Librarian, KNUST, Kumasi, Ghana at BioMed Open Access Africa Conference held at.
Advertisements

1 Welcome Training Programme Karachi Training Plan The objective of the workshop is to initiate the establishment of a training programme The.
Call for Proposals: Earth Observations in Decision Support Joint Effort of GEO Capacity Building Committee and User Interface Committee March 2009.
Community Based Cyber Security Program Technical Assistance Package Nicholas Corea Program Director G&H International Services for Donald Lumpkins, Program.
Web Services Presentation. Site Management Console (SMC)
Ethics and Information in the Digital Age Rafael Capurro University of Applied Sciences, Germany LIDA 2001, Dubrovnik, Croatia, May, 2001.
DEVA Data Management Workshop Devil’s Hole Pupfish Project Data Management Workshop Devil’s Hole Pupfish Program Death Valley National Park Introduction.
Corporation For National Research Initiatives NSF SMETE Library Building the SMETE Library: Getting Started William Y. Arms.
Continuous Auditing. Items to be discussed include: Developing a Continuous Auditing Program Continuous Auditing Process Benefits of Continuous Auditing.
Using virtual learning environments to support learners in virtual worlds Kerri McCusker, Michael Callaghan, Daniel Livingstone, Anna Peachey, Peter Bloomfield,
Developing an Effective Call Center within the Financial Aid Office Texas Association of Student Financial Aid Administrators Fall 2010 Conference.
Digital Asset Management for All? Visualising a Flexible DAMS Solution for Small and Medium Scale Institutions Paul Bevan Llyfrgell Genedlaethol Cymru.
Collaboration Portal Pilot Project Peter Clare Senior Project Manager Benjamin Cowell Community Facilitator Kate Harrington Information Management Project.
Mainframe Jobs at Verizon
{ GOAL: Prepare ISET Sidi Bouzid graduates to meet the economic demands of the local community Objective 1: To enhance the capacity of ISET Sidi Bouzid.
Cyber Security and Information Systems Information Analysis Center CSIAC Technical Focal Point Kickoff Meeting Thomas McGibbon 31 July Quanterion.
KNOWLEDGE MANAGEMENT TEAM. KM Skills in General 1. Time management → to acquire knowledge 2. Learning technique → to absorb knowledge 3. Networking skill.
FP OntoGrid: Paving the way for Knowledgeable Grid Services and Systems WP8: Use case 1: Quality Analysis for Satellite Missions.
Conferences - Hosting/co-hosting science conferences - Exhibit and present project output and services at community conferences Training Workshops - Data.
9/11/ SUPPORT THE WARFIGHTER DoD CIO 1 Sample Template Community of Interest (COI) Steering Committee Kick-off Date: POC: V1.0.
Information Systems Security Computer System Life Cycle Security.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
SPoRT’s Web Presence Fifth Meeting of the Science Advisory Committee November, 2009 Bradley ZavodskyErik Reimers Andrew MolthanPaul Meyer Geoffrey.
The GEF/UNDP/UNEP National Communications Support Programme United Nations Development Programme UNFCCC Workshop on the Preparation of National Communications.
Effective User Services for High Performance Computing A White Paper by the TeraGrid Science Advisory Board May 2009.
Test Roles and Independence of Testing Telerik Software Academy Software Quality Assurance.
CSIAC is a DoD Information Analysis Center (IAC) sponsored by the Defense Technical Information Center (DTIC) Presentation to: Insider Threat SOAR Workshop.
National Workshop on ANSN Capacity Building IT modules OAP, Thailand 25 th – 27 th June 2013 KUNJEER Sameer B History of centralized ANSN website as well.
ACCESS for VALIDITY ACCESS for INNOVATION. Starting January 2011 for NEW proposals Not voluntary – “integral part” of proposal and FastLane Required for.
Ms. Irene Onyancha ISTD/Library & Information Management Services United Nations Economic Commission for Africa The Second Session of the Committee on.
Feb Software Development and IT Security at NOAA/NESDIS/NODC John Relph and Ken Casey NOAA National Oceanographic Data.
ICT Standards and Guidelines The Structure of the Project Akram Najjar CNSI – Senior Consultant Director of InfoConsult.
Federal Networking and Information Technology R&D Program Big Data Senior Steering Group Wendy Wigen, Technical Coordinator April 13, 2012.
Miron Livny Center for High Throughput Computing Computer Sciences Department University of Wisconsin-Madison Open Science Grid (OSG)
GSA Expo 2010 DoD Travel Programs Customer Assistance Tools and Services Mr. Joe Ward and Ms. Margaret Hebert GSA Expo May 2010.
Mr. Gopi Nair Defense Technical Information Center Briefing at Board on Research Data and Information (BRDI) Meeting September 24, 2009 Approved for Public.
{ GOAL: Prepare ISETs Medenine/Tataouine graduates to meet the economic demands of the local community Objective 3: ISETs Medenine/Tataouine becomes recognized.
Developing Partnerships between NHS Board Knowledge Services and NES NHS Librarians Meeting 28 th January 2010.
EVA Workshop, 26 March 2003, Florence, Italy1 COINE Cultural Objects In Networked Environments Anthi Baliou University of Macedonia,Library Thessaloniki,
CSCI 6231 – Final Lecture Additional Resources and Topics.
A Net-Centric DoD NII/CIO 1 Sample Template Community of Interest (COI) Steering Committee Kick-off Date: POC:
The Library as a Community Information Center Nancy Bolt Nancy Bolt & Associates.
Page 1 JUSTIFY define and validate REQUIRE- MENTS define initial management DOCUMENTS define INFRA- STRUCTURE allocated maintenance changes management.
Breakout # 1 – Data Collecting and Making It Available Data definition “ Any information that [environmental] researchers need to accomplish their tasks”
GEF Evaluation Office. Two overarching objectives:  Promote accountability for the achievement of GEF objectives through the assessment of results, effectiveness,
Transportation Technology Exchange Globally Presented by: Kay Nordstrom U.S. Dept. of Transportation at U.S./East Africa Workshop Arusha, Tanzania August.
1 Bill Prymak, US Department of Energy Golden Field Office February 19, 2009 Energy Assessments: What are the Benefits to Small and Medium Facilities?
Z39.50 & The Z Texas Profile William E. Moen School of Library and Information Sciences University of North Texas Denton, TX.
High Confidence Software and Systems HCMDSS Workshop Brad Martin June 2, 2005.
Jonathan Carroll-Nellenback.
The Commonwealth Has a “VOICCE” Virginia’s Operational Integration Cyber Center of Excellence.
UNCLASSIFIED 1 06 February 2013Jenney Tagorda, Lead Knowledge Manager APAN Overview for ISTOP.
Controlled Vocabulary & Thesaurus Design Types of Controlled Vocabularies.
High Risk 1. Ensure productive use of GRID computing through participation of biologists to shape the development of the GRID. 2. Develop user-friendly.
CSI Controller Automated Logic Controller Existing Lab Station Lab Station Expansion TEAM MEMBERS: CLIENT: Andy
1 EUROPEAN COMMISSION Tempus JEP – – 2006 Supporting and facilitating active uptake to Information and Communication Technologies for University.
US Department of State Jay Coplon. My Commitment You will get a sense for how we do C&A You will find value in being here All of your questions will be.
Bob Jones EGEE Technical Director
State of the art We still have problem using 3D – There are no standard of how to make the modelling, so we can’t benefit from each other. There are not.
Support for Research Notebooks
The GEO AquaWatch Initiative CEOS “Freshwater from Space” Workshop
BioMedBridges – Work Packages 2 & 12
Electronics Engineering Division
Security for Safety: Enabling Digitalization of Railway Systems
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
Engineer What education and training is required to become an engineer? Read more:
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
Disaster Epidemiology Subcommittee Strategic Plan
Ben Rohrbaugh Lantern UAS, LLC
Jeff Dutton/NASA COR August 26, 2019
Presentation transcript:

Dr. Paul Losiewicz Senior Scientific Advisor Cyber Security and Information Systems Information Analysis Center (CSIAC)

DoD Information Analysis Centers (IACs) Purpose Act as Specialized Subject Focal Points for DoD Increase Productivity of DoD RDT&E Community Provide Timely Dissemination of Quality STI Function “Analysis” Sets IACs Apart from Libraries Specialized Services Are Leveraged to Benefit Users Scope of Activities Evolves IAW DoD Environment User Needs “Drive” Activities (Do What’s Needed) Implement KM to Enhance Productivity/User Access Provide Community of Interest Outreach IAC Domain Which technical subjects are addressed IAC Users Who the knowledge benefits Knowledge Management How data/information is acquired and handled 2 Cyber Security Software Engineering Modeling & Simulation Knowledge Management/ Information Sharing Materials Reliability/Quality Sensors Survivability Chemical Propulsion Weapon Systems Counter WMD ChemBio Treaty Monitoring Stand-off Sensors Effects Modeling

Tools for Cyber COI support Website: CSIAC Journal (quarterly) CSIAC Information Assurance Digest (twice monthly) Technical Inquiries (pro bono) Core Analysis Tasks (funded) Workshops State of the Art Reports (SOARs) – e.g. Insider Threat Webinars Document hosting Blog spaces STI searches NIST RMF Certification and Accreditation Training