IARPA: ADVANCED CYBER RESEARCH IN A CONNECTED WORLD DR. STACEY DIXON
|
|
- Bertha Allison
- 6 years ago
- Views:
Transcription
1 IARPA: ADVANCED CYBER RESEARCH IN A CONNECTED WORLD DR. STACEY DIXON 25 October 2016
2 Intelligence Advanced Research Projects Activity
3 The Intelligence Community Central Intelligence Agency Defense Intelligence Agency Department of State National Security Agency Department of Energy National Geospatial-Intelligence Agency Department of the Treasury National Reconnaissance Office Drug Enforcement Administration Army Federal Bureau of Investigation Navy Department of Homeland Security Air Force Coast Guard Marine Corps
4 IARPA s mission is to invest in high-risk/high-payoff research to provide the U.S. with an overwhelming intelligence advantage IARPA Mission and Method Bring the best minds to bear on our problems Full and open competition to the greatest possible extent World-class, rotational Program Managers Define and execute research programs that: Have goals that are clear, measureable, ambitious and credible Employ independent and rigorous Test & Evaluation Involve Intelligence Community (IC) partners from start to finish Run from three to five years Publish peer-reviewed results and data, to the greatest possible extent Transition relevant, successful capabilities to IC partners
5 User Application Operating System Firmware Hardware
6 User Application Operating System Hypervisor Firmware Hardware
7 IARPA Cybersecurity research alignment SPAR User CAUSE SCITE STONESOUP Application Operating System VirtUE Hypervisor Firmware CAT Hardware TIC 7
8 Security and Privacy Assurance Research (SPAR) 8
9 What do you do when a query is too sensitive to share, and bulk ingestion of the data raises privacy issues?
10 What do you do when a query is too sensitive to share, and bulk ingestion of the data raises privacy issues? Query Client Server Database, Policy Client learns: Response Query policy Other record contents Other clients queries Server learns: Query structure Query contents Query response Cross-query trends
11 SPAR Program Aims to create systems that guarantee privacy while also maintaining certain security characteristics Gives assurance to a data owner that only relevant information is shared Supports a practical set of query types and scales to realistic database sizes Enables collaboration between non-traditional/occasional partners, and administration without access to content
12 Ideal Sharing Architecture Query Client Server DB, Policy Third Party Encrypted (DB) Third Party learns limited information about DB and Queries Third Party management jointly decided by Client/Server Client learns: Response Query policy Other record contents Other clients queries Third party learns: Query structure Cross-query trends # of records returned Query contents Record contents Server learns: Query structure Query contents Query response Cross-query trends
13 SPAR Technical Accomplishments SPAR explored trade-offs among query complexity, security guarantees, processing time and memory requirements Approaches included: Oblivious Pseudorandom functions, Bloom Filters, Garbled RAMs, Private B-trees, and Shared input/shared output secure computation Program Status Program ended in 2015
14 Scientific advances to Continuous Insider Threat Evaluation (SCITE) 14
15 How can we advance the science and practice of insider threat detection?
16 SCITE Program Goals Model and forecast the performance of existing and proposed insider threat detection enterprises Develop a new class of active indicators and associated automated detection tools
17 SCITE Technical Accomplishments To be revealed Program Status Kick-off held in 2016 Program ongoing
18 Securely Taking on Executable Software of Uncertain Provenance (STONESOUP) Is this SOUP safe? 18
19 How can we benefit from highly functional software produced by a globalized industry without putting the enterprise at risk?
20 STONESOUP Program Protects systems by automatically preventing software weaknesses from being exploited STONESOUP Technology Automatically finds and mitigates exploitable security vulnerabilities in software Analyzes programs, not the data processed by programs Finds flaws that lead to insecure program conditions, rather than looking for known attack patterns
21 STONESOUP Technology Works with software as-built requires no software supplier input Starts secure/stays secure has a built-in conservative security policy with adaptive tuning to relax unneeded checks Mitigations are automatically applied requires no end user security decisions Benefit: Protected programs launch and run as expected
22 STONESOUP Technical Accomplishments Automatically hardens COTS software applications for higher assurance Linux binary executables with no access to source code required, C non-gui software applications up 100k lines of code, Java source code or bytecode applications Protects against embedded system exploits Measures the effectiveness of vulnerability mitigation tools and techniques Generates test data for cybersecurity research Program Status Program ended in 2015.
23 Circuit Analysis Tools (CAT) 23
24 Microelectronics designs are advancing faster than our capacity to analyze them. How do we keep up with microelectronics when next generation circuits are 10,000x smaller than a human hair?
25 CAT Program Develop tools for integrated circuit analysis at future technology nodes, specifically the 22 nm node and beyond. Analysis tools capable of working with advanced packages including but stacked die. Tools and techniques must address analysis and imaging challenges for which there are currently no solutions.
26 CAT Program Technical Thrusts Thrust 1: Circuit Edit Thrust 2: Fault Isolation Sample Preparation need Thrust 3: Logic Analysis Thrust 4: Fast Imaging
27 CAT Technical Accomplishments Developed a high brightness Gas Field Ion Source capable of delivering He, Ne, and Ar ions to mill at higher rates. Developed 2-photon laser technique that allows IR wavelengths to be used for Si transmission producing half wavelength imaging for higher resolution.
28 CAT Technical Accomplishments Developed a logic analysis tool capable of probing on 22nm SOI ICs. Developed a superconducting nanowire single-photon detector for higher efficiency and resolution. Developed a prototype hybrid laser/mechanical back-side silicon preparation tool Developed methods for thick and think dies.
29 Program Status Program complete. Several commercial products are in the marketplace.
30 Trusted Integrated Chips (TIC) 30
31 Over 90% of the world s integrated circuit foundry capacity is controlled by non-us companies. How can we leverage this global infrastructure while protecting intellectual property and ensuring security?
32 TIC Program Ensure the U.S. Intelligence Community can obtain the highest performance possible in integrated circuits. Obtain assurance that designs are safe and secure not compromised with malicious circuitry. Ensure security of designs, capability, and performance while simultaneously protecting intellectual property. Realize secure systems combining advanced CMOS with higher value chips.
33 TIC Program Develop new IC obfuscation layout strategies to protect both functional capability and performance. Demonstrate the concept of split-manufacturing of integrated circuits using a state-of-the-art untrusted FEOL (Front End of Line) foundry and a trusted BEOL (Back End of Line) foundry. Fabricate chips at the 130nm, 65nm and 28nm manufacturing nodes.
34 Secure Split-Manufacturing and Integration Wires MtM: MEMS, Photonics, Add l chips (US company) BEOL: Metallizations Trusted Foundry Transistors FEOL: CMOS Transistors + Metal 1 Untrusted Foundry
35 Technical Accomplishments Demonstrated split-manufacturing of integrated circuits at the 130nm and 65nm production nodes and is completing evaluation at 28nm. Both Single- and Split-fab wafers delivered; chips are now undergoing testing. Program Status Program is in its final phase. Findings are being shared with government and industry.
36 Cyber-attack Automated Unconventional Sensor Environment (CAUSE) 36
37 How can we forecast cyber-attack events, hours to weeks earlier than existing methods?
38 CAUSE Program goals Develop and validate unconventional multi-disciplinary sensor technology that will forecast cyber-attacks and complement existing advanced intrusion detection capabilities.
39 CAUSE Technical Accomplishments To be revealed Program Status Kick-off held in 2016 Program ongoing
40 Virtuous User Environment (VirtUE) 40
41 How can we develop user environments that are more dynamic, secure, auditable, transferrable, and efficient than the current offerings provided by traditional physical workstations and commercial Virtual desktop infrastructure?
42 VirtUE Program goals Develop new user environments. Develop innovative, dynamic analytics and infrastructures that can leverage these newly developed user environments to both automatically detect and deter security threats that IC user environments will be subject to in the new cloud infrastructure.
43 Let s Build a Better Environment A Virtue a virtual appliance built specifically for the purpose of safe, user-interactive computing tasks
44 Make the Virtue Role Focused Current User Environment Virtue User Environment 1 desktop environment = multiple user roles 1 Virtue environment = one user role
45 Build Dynamic Analytic Logic That Leverages Virtues
46 VirtUE Technical Accomplishments To be revealed Program Status Broad Area Announcement released on 18 October 2016 See iarpa.gov or Fed Biz Ops
47 IARPA Cybersecurity research alignment SPAR User CAUSE SCITE STONESOUP Application Operating System VirtUE Hypervisor Firmware CAT Hardware TIC 47
48 How to Engage with IARPA Research Program Broad Agency Announcement (BAA) Seedlings through IARPA-wide BAA Requests For Information (RFIs) Workshops Prize Challenges Or join us as a Program Manager for 3-5 years!
49 How to Contact IARPA
Intelligence Advanced Research Projects Activity. May 2014
Intelligence Advanced Research Projects Activity May 2014 Office of the Director of National Intelligence Central Intelligence Agency Defense Intelligence Agency Department of State National Security Agency
More informationIARPA Cloud Computing. IARPA Overview
IARPA Cloud Computing IARPA Overview Kerry Name Long Job Program Title Manager Date The United States Intelligence Community Central Intelligence Agency Defense Intelligence Agency Department of State
More informationIntelligence Advanced Research Projects Activity (IARPA) Overview to NDIA Small Business Conference. Dr. Lisa Porter Director, IARPA 7 June 2011
Intelligence Advanced Research Projects Activity (IARPA) Overview to NDIA Small Business Conference Dr. Lisa Porter Director, IARPA 7 June 2011 Overview IARPA s mission is to invest in high-risk/high-payoff
More informationStanding up to the semiconductor verification challenge
43 Bill Butcher Standing up to the semiconductor verification challenge Companies should seek faster, more cost-effective ways to test the quality of complex system-on-a-chip devices. Aaron Aboagye, Mark
More informationAutomatically Find and Fix Insecure Database settings with Oracle Management Cloud PRO4284
Automatically Find and Fix Insecure Database settings with Oracle Management Cloud PRO4284 David Wolf Snr Dir of Product Management - Oracle Oct 25, 2018 Session : PRO4284 Title: Automatically Find and
More informationGE Security. Picture Perfect TM. The only UNIX Platform for Integrated Security Management and Access Control. Reliable. Flexible. Efficient.
GE Security Picture Perfect TM The only UNIX Platform for Integrated Security Management and Access Control Reliable. Flexible. Efficient. 15 years and counting Picture Perfect v4 is even more reliable,
More informationOverview and Frequently Asked Questions
Overview and Frequently Asked Questions OVERVIEW On April 20, 2009, Oracle announced that it has agreed to acquire Sun Microsystems. The transaction is subject to regulatory approval and until such time
More informationSecure SoC Manufacturing: Foundation for a Connected World
Secure SoC Manufacturing: Foundation for a Connected World As mobile usage continues to permeate daily lives with increasingly sensitive data and high-value transactions, the importance of device security
More informationExalogic Elastic Cloud
Exalogic Elastic Cloud Mike Piech Oracle San Francisco Keywords: Exalogic Cloud WebLogic Coherence JRockit HotSpot Solaris Linux InfiniBand Introduction For most enterprise IT organizations, years of innovation,
More informationIBM Db2 Warehouse. Hybrid data warehousing using a software-defined environment in a private cloud. The evolution of the data warehouse
IBM Db2 Warehouse Hybrid data warehousing using a software-defined environment in a private cloud The evolution of the data warehouse Managing a large-scale, on-premises data warehouse environments to
More informationHelping government agencies achieve mission success. Government and Public Sector (GPS)
Helping government agencies achieve mission success Government and Public Sector (GPS) Table of contents 2 Government and Public Sector (GPS) Who we are Our purpose... 4 What we do Our perspective... 8
More informationDeveloping Connected Products - What s needed? Driven to enable your success!
Developing Connected Products - What s needed? Driven to enable your success! What s a Connected Product Smart, connected products are products, assets and other things embedded with processors, sensors,
More informationDELTA Microelectronics
DELTA / ASIC DELTA Microelectronics Complete supply chain services Flexible business models etc. We help ideas meet the real world / ASIC.MADEBYDELTA.COM About us DELTA Microelectronics is a leading European
More information10 REASONS FOR ARIS. ARIS Product Marketing July Software AG. All rights reserved.
10 REASONS FOR ARIS ARIS Product Marketing July 2017 2 10 REASONS FOR ARIS 1 2 3 4 5 6 7 8 9 10 User Experience Social Collaboration Customer Experience Management Mobility & Cloud Internet of Things (IoT)
More informationSysTrack Workspace Analytics
SysTrack Workspace Analytics The Visibility IT Needs to Enable End-User Productivity Challenge IT executives are under constant pressure to cost-effectively manage complex IT systems. SysTrack enables
More informationNew Ways to Leverage Open Source
#techsummitch New Ways to Leverage Open Source NEW DEMANDS NEW OPPORTUNITIES Open Source Projects Have Exploded + SUSE: What it Means to be Open Open Source Community Customers & Partners Committed to
More informationInternship opportunities at Check Point!
Internship opportunities at Check Point! Please send your CV to: Daniele@checkpoint.com. Please mention 3 internship opportunities you are interested in. Infrastructure Developer Join the development team
More informationIBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights
IBM Security Data Sheet IBM QRadar SIEM Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights Use IBM QRadar Security Information and Event Management, powered by the
More informationLenovo Services for the Data Center
Lenovo Services for the Data Center September 28, 2016 Mission Our mission is to be your trusted partner in the data center. #1 Thousands of customers trust Lenovo Services to run their businesses and
More informationOptimizing Outcomes in a Connected World: Turning information into insights
Optimizing Outcomes in a Connected World: Turning information into insights Michael Eden Management Brand Executive Central & Eastern Europe Vilnius 18 October 2011 2011 IBM Corporation IBM celebrates
More informationKEEPING RAIL PROJECTS ON TRACK AND ON TIME: SOLUTIONS FOR MASTERING COMPLEX TECHNOLOGY CHALLENGES By Alexander Damisch, Director, Industrial Markets
KEEPING RAIL PROJECTS ON TRACK AND ON TIME: SOLUTIONS FOR MASTERING COMPLEX TECHNOLOGY CHALLENGES By Alexander Damisch, Director, Industrial Markets INNOVATORS START HERE. EXECUTIVE OVERVIEW Safe, efficient,
More informationDRIVING SEMICONDUCTOR MANUFACTURING BUSINESS PERFORMANCE THROUGH ANALYTICS
www.wipro.com DRIVING SEMICONDUCTOR MANUFACTURING BUSINESS PERFORMANCE THROUGH ANALYTICS Manoj Ramanujam Table of Contents 03... Introduction 03... Semiconductor Industry Overview 05... Data Sources and
More informationBuying IoT Technology: How to Contract Securely. By Nicholas R. Merker, Partner, Ice Miller LLP
Buying IoT Technology: How to Contract Securely By Nicholas R. Merker, Partner, Ice Miller LLP More and more products are shipping with sensors and network connectivity to capitalize on the currency of
More informationTechPaper. EB cadian Sync software updates over the air
TechPaper EB cadian Sync software updates over the air The importance of over-the-air software updates is increasing dramatically. Elektrobit s powerful and flexible solution provides OEMs with a customized
More informationTechPaper. EB cadian Sync software updates over the air
TechPaper EB cadian Sync software updates over the air The importance of over-the-air software updates is increasing dramatically. Elektrobit s powerful and flexible solution provides OEMs with a customized
More informationUtility Vegetation Management in the 21st Century. 3D Virtualization Reduces Risks, Maintenance Costs
3D Virtualization Reduces Risks, Maintenance Costs The Vegetation-Powerline Threat Trees and branches falling onto power lines are among the leading causes of power outages in North America. Dealing with
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Oracle Fusion Middleware Next-Generation Application Platform Web Social Mobile Business Process Management Service Integration User Engagement Content Management Identity Management Business Intelligence
More informationUNDERSTANDING CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)
ONLINE REPORT SPONSORED BY: CONTRACT GUIDE UNDERSTANDING CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) INSIDE 2 3 4 5 6 WHAT IS CDM AND WHY DO YOU NEED IT? CDM COULD BE A GAME-CHANGER HOW DOES CDM WORK? WITH
More informationIC Integrated Manufacturing Outsourcing Solution
IC Integrated Manufacturing Outsourcing Solution Integrated One-Stop Service Mature and Low Cost Loop for IC Manufacturing Taiwan s Comprehensive Resources Fast and Easy Engagement to Our Solution Professional
More informationMAXIMIZE PERFORMANCE AND REDUCE RISK
PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK FOR ASTRO 25 AND DIMETRA SYSTEMS LATIN AMERICA REGION COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications
More informationUncovering the Hidden Truth In Log Data with vcenter Insight
Uncovering the Hidden Truth In Log Data with vcenter Insight April 2014 VMware vforum Istanbul 2014 Serdar Arıcan 2014 VMware Inc. All rights reserved. VMware Strategy To help customers realize the promise
More informationSEER for Hardware Electronics and Systems Extended Capabilities
SEER for Hardware Electronics and Systems Extended Capabilities Keith Garland Andrew Langridge Bletchley Conference 2008 1 SEER for Hardware Client for Microsoft Project Keith Garland Galorath International
More informationEDA Technologies Fueling IoT Implementation, Current and Future
EDA Technologies Fueling IoT Implementation, Current and Future Michael Thompson Internet of Things (IoT) Summit, RWW 2018 Anaheim, California January 14, 2018 IoT Standards/Applications 2 Industry Trends
More informationFUELING SAFER, MORE EFFICIENT PETROLEUM RETAIL OPERATIONS with the Internet of Things
FUELING SAFER, MORE EFFICIENT PETROLEUM RETAIL OPERATIONS with the Internet of Things Gas stations are getting smarter - and Petrosoft is helping fuel this transformation. The company is harnessing Internet
More informationIntegrated IT Management Solutions. Overview
Integrated IT Management Solutions Overview freedommanage IT, The Numara FootPrints family of IT Management products and solutions streamline, automate and improve IT operations. They have been designed
More informationARE YOU GOING DIGITAL WITHOUT A NET?
ARE YOU GOING DIGITAL WITHOUT A NET? Whether your business is embracing new digital technologies or moving to the cloud, your network needs to be up to the task. 2 ARE YOU GOING DIGITAL WITHOUT A NET?
More informationEmerging & disruptive technology risks
Emerging & disruptive technology risks Shawn W. Lafferty, KPMG Partner IT Internal Audit/Risk Assurance April 2018 Why IT internal audit? find ways to overcome resource and budgetary constraints. This
More informationWHITE PAPER Migrating to the Cloud
WHITE PAPER Make the move without making mistakes 1 Introduction The cloud is a nebulous concept, literally. Moving to the cloud is not as straightforward as moving a data center from San Francisco to
More informationIBM Tivoli Workload Scheduler
Manage mission-critical enterprise applications with efficiency IBM Tivoli Workload Scheduler Highlights Drive workload performance according to your business objectives Help optimize productivity by automating
More informationBusiness Resilience: Proactive measures for forward-looking enterprises
IBM Global Services Business Resilience: Proactive measures for forward-looking enterprises protect deflect predict adapt Working with IBM, you can develop and implement a flexible business resilience
More informationInfor CloudSuite solutions Flexible, proven solutions designed for your industry. Infor CloudSuite
solutions Flexible, proven solutions designed for your industry 1 Unlock your full potential with Cloud technologies can offer your business a degree of agility and path to rapid growth that simply wasn
More informationModernize Transactional Applications with a Scalable, High-Performance Database
SAP Brief SAP Technology SAP Adaptive Server Enterprise Modernize Transactional Applications with a Scalable, High-Performance Database SAP Brief Gain value with faster, more efficient transactional systems
More informationAn Oracle White Paper September, Oracle Exalogic Elastic Cloud: A Brief Introduction
An Oracle White Paper September, 2010 Oracle Exalogic Elastic Cloud: A Brief Introduction Introduction For most enterprise IT organizations, years of innovation, expansion, and acquisition have resulted
More informationOracle Big Data Cloud Service
Oracle Big Data Cloud Service Delivering Hadoop, Spark and Data Science with Oracle Security and Cloud Simplicity Oracle Big Data Cloud Service is an automated service that provides a highpowered environment
More informationEFFORTLESSCASE THE CASE FOR DESKTOP-AS-A-SERVICE
EFFORTLESSCASE THE CASE FOR DESKTOP-AS-A-SERVICE Traditional IT relies on your computers and servers being on premises. From a user s computer to servers - everything functions on the traditional local
More informationIntelligent automation and internal audit
Intelligent automation and internal audit Adding value through governance, risk management, and controls Second article in the series kpmg.ch Contents Governing intelligent automation across the enterprise
More informationA Examcollection.Premium.Exam.35q
A2030-280.Examcollection.Premium.Exam.35q Number: A2030-280 Passing Score: 800 Time Limit: 120 min File Version: 32.2 http://www.gratisexam.com/ Exam Code: A2030-280 Exam Name: IBM Cloud Computing Infrastructure
More informationNanofocused X-Ray Beam To Reprogram Secure Circuits
Nanofocused X-Ray Beam To Reprogram Secure Circuits Stéphanie Anceau, Pierre Bleuet, Jessy Clédière, Laurent Maingault, Jean-luc Rainard, Rémi Tucoulou Let s speak about X-rays Ionizing radiations are
More informationNetwork Access Control (NAC) Market, Global, Forecast to 2022
NEXT STEPS Network Access Control (NAC) Market, Global, Forecast to 2022 NAC Evolving as Enterprise Networks Expand Beyond Secure Walls A Frost & Sullivan White Paper www.frost.com 50 Years of Growth,
More informationIT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem.
ACM CCECC Serving computing education communities since 1991. Information Technology Metrics IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem. Lists appropriate
More informationA technical discussion of performance and availability December IBM Tivoli Monitoring solutions for performance and availability
December 2002 IBM Tivoli Monitoring solutions for performance and availability 2 Contents 2 Performance and availability monitoring 3 Tivoli Monitoring software 4 Resource models 6 Built-in intelligence
More informationApiOmat. Case Study. Challenge
Case Study SUSE CaaS Platform SUSE Cloud Application Platform In today s digital world, we expect to be able to do everything on our smartphones. makes it quicker and easier for enterprises to develop
More informationThe Applicability of HPC for Cyber Situational Awareness
The Applicability of HPC for Cyber Situational Awareness Leslie C. Leonard, PhD August 17, 2017 Outline HPCMP Overview Cyber Situational Awareness (SA) Initiative Cyber SA Research Challenges Advanced
More informationVULNERABILITY MANAGEMENT BUYER S GUIDE
VULNERABILITY MANAGEMENT BUYER S GUIDE VULNERABILITY MANAGEMENT BUYER S GUIDE 01 Introduction 2 02 Key Components 3 03 Other Considerations 10 About Rapid7 11 01 INTRODUCTION Exploiting weaknesses in browsers,
More informationVULNERABILITY MANAGEMENT BUYER S GUIDE
VULNERABILITY MANAGEMENT BUYER S GUIDE CONTENTS Introduction 2 Key Components 3 Other Considerations 11 About Rapid7 12 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems, and other third-party
More informationIBM United States Software Announcement , dated March 27, 2018
IBM United States Software Announcement 218-099, dated March 27, 2018 IBM Bluemix Local System (now IBM PureApplication Platform) and IBM PureApplication System firmware V2.2.5 deliver capabilities for
More informationDelivering high-integrity accounting with Xero
Delivering high-integrity accounting with Xero Contents Untouched data feeds directly into Xero 4 A multi-layered approach to data integrity 5 Access controls 6 Monitoring and alerts 7 Controls and reporting
More informationVTT & VTT Memsfab. Fast track to fab. Howard Rupprecht VP Manufacturing Services / CEO VTT Memsfab Oy. 11/12/2018 VTT beyond the obvious 1
VTT & VTT Memsfab Fast track to fab Howard Rupprecht VP Manufacturing Services / CEO VTT Memsfab Oy 11/12/2018 VTT beyond the obvious 1 VTT Memsfab in Brief VTT subsidiary company offering manufacturing
More information1 P a g e. IT Tailored to Your Needs
1 P a g e IT Tailored to Your Needs Bluescope Technologies is a leading provider of IT services to businesses of all sizes in a wide range of industries. Bluescope s headquarters are situated in Limerick,
More information2 Analytics Reinvented
Federal agencies now have access to larger and richer collections of data to advance their mission. New technologies and techniques make it possible to collect, analyze and act on this data in new and
More informationA Woman-owned Small Business /
A Woman-owned Small Business / www.strateratech.com Founded in 1999 as Anvil Logic, a product development firm. Switched focus to software development and systems integration and changed name to Stratera
More informationRAPID AUTHENTICATION THROUGH VERIFICATION, VALIDATION, AND MARKING
RAPID AUTHENTICATION THROUGH VERIFICATION, VALIDATION, AND MARKING Mr. Kerry Bernstein, DARPA/MTO Program Manager NDIA Trusted Microelectronics Workshop August 17, 2016 The DARPA solution is to provide
More information<Insert Picture Here> Business-Driven IT Management with Oracle Enterprise Manager
Business-Driven IT with Oracle Enterprise Manager Leng Tan Vice President of Product Development The following is intended to outline our general product direction. It is intended
More informationBig and Fast Data: The Path To New Business Value
Big and Fast Data: The Path To New Business Value A Pivotal Overview Umair Riaz vspecialist 2 Gain Business Value with Big and Fast Data Pivotal Provides Agile Platform for Data-Driven Applications Ingest
More informationzenterprise Update and Positioning with PureSystems
zenterprise Update and Positioning with PureSystems Greg Lotko IBM Corporation August 7, 2012 Session Number 11797 Agenda Hybrid computing for a Smarter Planet zenterprise the System of Systems zenterprise
More informationSecurity intelligence for service providers
Security Thought Leadership White Paper July 2015 Security intelligence for service providers Expanded capabilities for IBM Security QRadar including multi-tenancy, unified management and SaaS 2 Security
More informationTHE CLOUD, RISKS AND INTERNAL CONTROLS. Presented By William Blend, CPA, CFE
THE CLOUD, RISKS AND INTERNAL CONTROLS Presented By William Blend, CPA, CFE AGENDA Cloud Basics Risks Related Cloud Use GOA on Service Level Agreements COSO ERM Internal Control Model 2 CLOUD BASICS Evolution
More informationApplication Migration to Cloud Best Practices Guide
GUIDE JULY 2016 Application Migration to Cloud Best Practices Guide A phased approach to workload portability Table of contents Application Migration to Cloud 03 Cloud alternatives Best practices for cloud
More informationData is only getting more complicated and siloed. Each dimension of data is constantly expanding
Data is only getting more complicated and siloed Each dimension of data is constantly expanding $40k more revenue per employee But companies that take control of data outperform the competition 50%+ higher
More informationNetwork maintenance evolution and best practices for NFV assurance October 2016
Network maintenance evolution and best practices for NFV assurance October 2016 TECHNOLOGY BUSINESS RESEARCH, INC. 2 CONTENTS 3 Introduction: NFV transformation drives new network assurance strategies
More informationIBM Security Investor Briefing 2018
IBM Security Investor Briefing 2018 Marc van Zadelhoff General Manager, IBM Security Michael Jordan Distinguished Engineer, IBM Z Security 1 2018 IBM Corporation Forward looking statements and non-gaap
More informationStrategic Plan
Information Technology Strategic Plan 2019-2021 Presented by Darin King Vice Chancellor for Information Technology/CIO Strategic Plan 2019-2021 Contents Executive Summary... 3 Goals...4 GOAL ONE...4 GOAL
More informationThe Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS
The Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS Rob Aragao & Stan Wisseman #MicroFocusCyberSummit Primary Goal of Businesses Today Drive Digital Transformation!! 2 For Most Organizations,
More informationThe Role of the Operating System in Cloud Environments
The Role of the Operating System in Cloud Environments Judith Hurwitz, President Marcia Kaufman, COO Sponsored by Red Hat Cloud computing is a technology deployment approach that has the potential to help
More informationSecurity solutions White paper. Effectively manage access to systems and information to help optimize integrity and facilitate compliance.
Security solutions White paper Effectively manage access to systems and information to help optimize integrity and facilitate compliance. March 2007 Contents 2 Overview 3 Answer key questions related to
More informationManage Projects Effectively
White Paper Application Development, Test & Delivery Manage Projects Effectively Table of Contents page Executive Summary... 1 The Micro Focus Solution Invest in What Matters Most then Manage It... 2 Strategic
More informationIntegrated Service Management
Integrated Service Management for Power servers As the world gets smarter, demands on the infrastructure will grow Smart traffic systems Smart Intelligent food oil field technologies systems Smart water
More informationPartnerships Remove Complexity from HPC Clusters
DESKTOP ENGINEERING WITH HP & INTEL ON: Partnerships Remove Complexity from HPC Clusters The right value-added reseller partner can help you navigate the complexities of HPC cluster deployment and achieve
More informationConnected Plant PHARMACEUTICAL SOLUTIONS FOR A CHALLENGING MARKET
Connected Plant PHARMACEUTICAL SOLUTIONS FOR A CHALLENGING MARKET Pharmaceutical Solutions for a Challenging Market For more than three decades, Honeywell s solutions and services have helped the world
More informationUSING LINUX IN MEDICAL DEVICES: WHAT DEVELOPERS AND MANUFACTURERS NEED TO KNOW By Ken Herold, Engineering Specialist, Wind River
USING LINUX IN MEDICAL DEVICES: WHAT DEVELOPERS AND MANUFACTURERS NEED TO KNOW By Ken Herold, Engineering Specialist, Wind River WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE OVERVIEW Linux is the operating
More informationDESKTOP ENGINEERING WITH HP & INTEL ON: Partnerships Remove Complexity from HPC Clusters
DESKTOP ENGINEERING WITH HP & INTEL ON: Partnerships Remove Complexity from HPC Clusters The right value- added reseller partner can help you navigate the complexities of HPC cluster deployment and achieve
More informationMicrosoft Dynamics Business Solutions. New Era of Business Productivity for the Dynamic Organization. Intelligent Business Software House
Microsoft Dynamics Business Solutions New Era of Business Productivity for the Dynamic Organization Intelligent Business Software House Move your data to the cloud Azure What is happening with cloud technology?
More informationMobileKnowledge. We help companies leverage the secure IoT revolution
IoT and security MobileKnowledge MobileKnowledge is a team of HW, SW and system engineers, experts in smart, connected and secure technologies for the IoT world. We are your ideal engineering consultant
More informationThe Optanix Platform. Service Predictability. Delivered. Optanix Platform Overview. Overview. 95% 91% proactive incidents first-time fix rate
The Optanix Platform Service Predictability. Delivered. Overview The Optanix Platform is a complete SaaS-based IT operations management solution, delivering integrated monitoring, event management, incident
More informationebook THE FIVE-STEP STRATEGY FOR QUALITY AND RISK-MANAGED LIFE SCIENCES TRANSLATIONS PAGE 1 library
ebook library PAGE 1 THE FIVE-STEP STRATEGY FOR QUALITY AND RISK-MANAGED LIFE SCIENCES TRANSLATIONS The Five-Step Strategy for Quality and Risk- Managed Life Sciences Translations Companies in the life
More informationDesktop Virtualization Solutions Simplified Appliance
Desktop Virtualization Solutions Simplified Appliance Seizing opportunities the challenging workplace Small and midsize businesses, educational organizations, governments and public sector agencies want
More informationCONSULTING & CYBERSECURITY SOLUTIONS
CONSULTING & CYBERSECURITY SOLUTIONS Who We Are Since 1996, Crossroads has been established as a respected Technology and Business Availability Enterprise with strategic competencies in Consulting, Compliance,
More informationData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint Webinar Coby Royer Director of Product Management CipherPoint croyer@cipherpoint.com Twitter @CipherPointSW Don Miller Vice President of Commercial Accounts
More informationSYED ALAM GREG DOUGLASS
SYED ALAM GREG DOUGLASS In 1965, Dr. Gordon Moore suggested that semiconductor companies would double the number of transistors in an integrated circuit every two years. For 50 years or about 40 years
More informationPowering the Edge to the Enterprise
Powering the Edge to the Enterprise Intelligent Equipment. Smart Devices. Smart Systems for OEMs. Intelligent Equipment. Smart Devices. Smart Systems. Our connected world is increasingly populated with
More informationTensoft SemiOps. SaaS Solutions for the Semiconductor and Sensor Industries including IC and Module Businesses
Tensoft SemiOps SaaS Solutions for the Semiconductor and Sensor Industries including IC and Module Businesses Tensoft SemiOps Cloud Platform 15+ Years of Experience in Semiconductor Industry Tensoft SemiOps
More informationIT forecast: How to increase secure mobility and productivity for your workforce
IT forecast: How to increase secure mobility and productivity for your workforce 1 Manage security within the evolving workplace and enable your teams to work virtually anytime, anywhere New technology
More informationSAP Configuration Validation Solution Brief. Objectives Solution Benefits Quick Facts
SAP Configuration Validation Solution Brief Objectives Solution Benefits Quick Facts Drive your business with confidence Realize the potential of SAP software Develop a robust response to cyber risks SAP
More informationPREVENT MAJOR DATA BREACHES WITH THREAT LIFECYCLE MANAGEMENT Seth Goldhammer, Senior Director of Product Management at LogRhythm
PREVENT MAJOR DATA BREACHES WITH THREAT LIFECYCLE MANAGEMENT Seth Goldhammer, Senior Director of Product Management at LogRhythm WELCOME Audio is streamed over your computer Dial in numbers and codes are
More informationSCALARi500. SCALAR i500. The Intelligent Midrange Library Platform FEATURES AND BENEFITS
Intelligent Storage SCALARi500 SCALAR i500 The Intelligent Midrange Library Platform 1 TO 18 DRIVES 36 TO 404 CARTRIDGES MODULAR GROWTH, CONTINUOUS ROBOTICS CAPACITY-ON-DEMAND iplatform ARCHITECTURE AND
More informationVendor Management Risk Mitigation:
Vendor Management Risk Mitigation: The Importance of Having a Formalized Methodology Sun Life Financial Laura Williams AVP, Procurement Opus Sam Mele Vice President Sales sig.org/summit Case Study: Supplier
More informationA Brief History of Messaging, Morse, Maths and Magyar
A Brief History of Messaging, Morse, Maths and Magyar And The Future Through ORACLE INTEGRATED CLOUD & CONVERGED PLATFORMS Scott Wilson Chief Architect/Senior Director EMEA SMART Platform Architecture
More information2018 WTW General Industry Information Technology Compensation Survey Report - U.S.
FUN AID IT Development Designs, develops, modifies, adapts and implements short- and long-term solutions to information technology (IT) needs through new and existing applications, systems architecture,
More information