Geospatial Cyber Security Russ Holder Vice-President Complex Systems Engineering and Integration Intergraph Government Solutions.

Slides:



Advertisements
Similar presentations
Device Evolution Greg Pelton Chief Technology Officer
Advertisements

Bomgar Product Strategy SECURE REMOTE SUPPORT FOR THE MOBILE ENTERPRISE © 2011 Bomgar Corporation | CONFIDENTIAL BOMGAR Solution Overview Stuart McGregor.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Workforce & Engineering Design Optimization Plenary Session: Enterprise Resource Planning for Infrastructure and Utilities Gurgaon India Feb GIS.
Cyber and Maritime Infrastructure
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Secure Communications in the Cyber World Phil Mar September 2010.
Integrated Incident Management System (IIMS) June 19, 2014.
Asymmetric Threat Tracker Advanced Convoy Scenario Donald E. Brown, PhD James H. Conklin Department of Systems & Information Engineering University of.
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
Focus on Strategic R&D Budhendra Bhaduri, Raju Vatsavai Geographic Information Science and Technology (GIST), Computational Sciences and Engineering Division.
GSC16-OBS-03 ITU-T GSC – 16 Observer Presentation Karen Higginbottom, JTC 1 Chair.
1 PakNetX What is an Internet ACD? Spring 98 VON Conference Bruce Allen, President and CEO PakNetX Corporation
Geospatial Information Interoperability Exploitation-Portable (GIIEP)
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All IEEE-SA Smart Grid Steve Mills, President, IEEE Standards Association Document No: GSC16-PLEN-47.
California Common Operating Picture (Cal COP) for Public Safety
Lessons Learned in Smart Grid Cyber Security
CybAIRVision® Next generation of Cyber-attacks : “Air Operations cyber intrusion detection”
Emergency Management & HLS Solution Assessment and Pre-Planning Software.
The sun never sets on USASMDC/ARSTRAT “Secure the High Ground” Defense Support to Civil Authorities (DSCA) Variant OPERATIONAL APPROACH Simultaneous input/display.
© 2011 Institute for the Future. All rights reserved. | SR-1414 Technology Horizons Program Institute for the Future May 26, 2011 Forecasting the Smart.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
RIOS Overview Overall classification of this brief is UNCLASSIFIED.
AND Technology Redefining mobile solutions for your business success.
Information Technology Lonnie Bentley, Professor and Head Department of Computer Technology (CPT) - and - H. E. (Buster) Dunsmore, Professor Department.
Aug 19, Agenda Requirements Development OV-1 Components Fielding and Training Application Base Station Operations Fusion of Data Elements Upgrade.
U. S. Coast Guard Requirements Maritime Security.
Live-Streamed Video Incident Reporting Crowd-Sourced Video for Security and Public Safety.
Video Communication Market Trends Rafi Anuar Director, Product Management.
C11- Managing Knowledge.
Jack Tombrella Northrop Grumman Corporation Rocket City Geospatial Conference November 18-20, 2008 Real-time Collaborative Planning.
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
Common Information Model - enabling data exchanges and interoperability in the electric utility industry P&E Magazine, May 2015 Power & Energy Magazine.
Smart Grid Network Transformation Arthur Locke, Alcatel-Lucent
SWITCH SWITCH to consider when updating your facility 6 simple things How do you choose?
Resilience as a Service CAP as the foundation for Situational Intelligence PRESENTATIO N September 2015.
North American Energy Infrastructure Policy Philip Gonda Steven Mays Robert Floyd Josh Kapp.
Secure Communications—No Compromise Real Time Communications in Emergency Response Planning and Operations Tim Vittetoe VIACK Corporation.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
SMART GRID A smart grid for intelligent energy use. By: Suhani Gupta.
Bridging the Gap Workshop George Brett Russ Hobby Internet2 Fall Member Meeting September 20, 2005 George Brett Russ Hobby Internet2 Fall Member Meeting.
Spatially Enabling Enterprise Asset Management with GeoMedia ® Smart Client Bruce Aquila, Transportation Consultant Intergraph Corporation Security, Government.
© 1stWorks Corp.. 1stWorks Background Formed in the fall of 2000 by survivors of earlier, successful startups and based in Boston Focused on leveraging.
Consumers Energy Advanced Metering Infrastructure Review and Feedback Utility AMI / Open HAN Meeting August 15, 2007.
LECTURER: NGUY Ễ N ANH TU Ấ N (TUAN NGUYEN) TUTORS: TÔN TH Ị KIM LOAN TR Ầ N H Ồ NG NGHI {TUANNA, LOANTTK, Developing Applications.
Business Communications Paradigm Shift telephone web conferencing teleconferencing two-party video multi-party video tools.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
Strand 3 Maya Mangindin 3.5 Public and Personal Communications.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
GIS From the back office to the enterprise Ciaran Kirk Technical Director, IMGS.
Alliance Technology Group April 14, 2016 Mindy Marvel
Surveillance and Security Systems Cyber Security Integration.
Android Application Development Company India
DoD Cyberspace Workforce Definitions
Digital Map Server for Real Time Embedded Platforms
5G Security Training
THIS IS A TIPS & TRICKS SLIDE FOR YOU
DoD Cyberspace Workforce Definitions
أ.د. عبدالله بن عبدالعزيز الموسى
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 21 March 2018.
Office 365 when and where you need it. [Add your logo here]
کتابهای تازه خریداری شده دروس عمومی 1397
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 26 September 2018.
ITC/CTIT meeting 24 October 2016.
New Challenges in Systems Safety - Themes
Presentation transcript:

Geospatial Cyber Security Russ Holder Vice-President Complex Systems Engineering and Integration Intergraph Government Solutions

Geospatial Cyber Security Geo-Cyber Security Energy/Utilities/SmartGrid Force Protection/Emergency Management Geospatial Location Intelligence

Geo-Cyber Security Traditional virtual network maps vs. geo-enabled maps Physical locations of Cyber assets and sources of attack are important for the Common Operating Picture (COP) Offensive and defensive cyber analysis Risk assessments Cyber forensics

Geo-Cyber Security Incident Tracking

Energy Control Rooms, Control Systems, Communications, and Cyber Security (C4)

Energy/Utility/Smart Grid Geo-Cyber Issues SmartGrid and Control System assets are Geospatially distributed Smart Grid assets can be tracked/displayed on a map now; near-real time asset tracking on a map is TBR The “Smart Grid” is not “Cyber Smart” yet Open standards and modern communications technology are needed for increased interoperability Engineering Control systems are different than Corporate IT systems

Force Protection/Emergency Management and Geo-Cyber Security

Force Protection/Emergency Management and Geo-Cyber Issues Many of these systems are proprietary, web/data base applications with no Geospatial capability For those applications with Geospatial capability, many Geo-enabled features can be integrated: Location based services for fixed and mobile assets Near-real time Geo-position/status updates Mobile asset Geo-Cyber example

Geospatial Location Intelligence

Geospatial Information Interoperability Exploitation Portable (GIIEP) program Provide “Blue Force Tracking” like capability for air/ground/marine/space assets Geo-enabled collaboration capabilities such as white boarding, graphics dissemination, data distribution, chat, video and Common Operational Picture (COP) Cyber-certified (ATO and CON) application and supports PDA’s, SmartPhones and new technologies such as iPad & Android Pad.