Advanced SOC. Key Technologies for Security Operations. RSA Security Summit 2014 Advanced SOC. RSA Security Summit, 24 april 2014 Marcel Knippen
|
|
- Susanna Gilbert
- 6 years ago
- Views:
Transcription
1
2 Advanced SOC Key Technologies for Security Operations RSA Security Summit, 24 april 2014 Marcel Knippen IT Security Experts Onsight External Use 2
3 Agenda Intro Onsight What s the need for an advanced SOC Define your goal The adaptive security model Challenges People, Processes & Technology IT Security Experts Onsight External Use 3
4 Intro Onsight Since 1999, 100% focus on IT Security Security for Enterprises Security Operations & Monitoring Security Solutions Delivery Committed to Customer Satisfaction Dutch company, 70 employees Security Operations Center ISAE 3402, ISO IT Security Experts Onsight External Use 4
5 What s the need for an advanced SOC Closed networks are transforming to open environments Fading borders: physical, ownership, responsibility, geographical IT becomes critical to business success Cost of threat impact is rising Management responsibility Incidents are occurring more and more Existing prevention capabilities are getting less effective Governance, Risk and Compliance IT Security Experts Onsight External Use 5
6 What s the need for an advanced SOC Incidents might occur reactive ad hoc Incident response Incidents will occur proactive process Continuous response IT Security Experts Onsight External Use 6
7 Define your goal What do you expect from your SOC? IT Security Experts Onsight External Use 7
8 IT Security Experts Onsight External Use 8
9 Clearly define your goal It s easy to get lost Average customer generates logs per day events per day. and growing Top down approach Start with (a subset of) management committed standards Clearly define the deliverables IT Security Experts Onsight External Use 9
10 Adaptive security model Foundation for the advanced SOC IT Security Experts Onsight External Use 10
11 Proactive security Exposure Predict Baseline Remediate Change Investigate Continuous Monitoring and Analyzing Isolate Divert Prevent Detect Prioritize Contain breach IT Security Experts Onsight External Use 11
12 Security resources: People and technology IT Security Experts Onsight External Use 12
13 Baseline systems Continuous re-baselining Discovery of devices, systems, services, identities, vulnerabilities,.. Predict attacks Understand the Attack Workflow Proactive exposure analyses New devices, applications and services come and go Are compensating controls needed? IT Security Experts Onsight External Use 13
14 故曰 : 知彼知己, 百戰不殆 ; 不知彼而知己, 一勝一負 ; 不知彼, 不知己, 每戰必殆 If you know your enemies and know yourself, you can win a hundred battles without a single loss. Sun Tzu, The Art of War IT Security Experts Onsight External Use 14
15 Know your enemy : Cyber Threats Agents (Attackers) Corporations Nation States Hacktivists Cyber Terrorists Cyber Criminals Cyber Fighters Script Kiddies Online Social Hackers Employees IT Security Experts Onsight External Use 15
16 Know their weapons: Top 10 Cyber Threats 1. Drive-by Downloads 2. Malicious Code: Worms/Trojans 3. Code Injection 4. Exploit Kits 5. Botnets 6. Physical Damage/Theft/Loss of media 7. Identity Theft/Fraud 8. Denial of Service 9. Data Breaches 10. Targeted Attacks Threat Landscape 2013 IT Security Experts Onsight External Use 16
17 Know how they operate? Attack Workflow Drive-by downloads Worms/Trojans IT Security Experts Onsight External Use 17
18 不知彼而知己 And know yourself Exposure Vulnerabilities Measures Assets Controls IT Security Experts Onsight External Use 18
19 Probability RSA Security Summit 2014 Advanced SOC Know yourself: Domain, Risk, Business Impact IT Domains - Critical Infrastructure - Cloud computing - Social Networking - E-commerce - Mobility - Office workplace - Trusted Infrastructure - Internet of things -. Impact IT Security Experts Onsight External Use 19
20 Isolate systems Reduce the attack surface Harden and segment (sub-)systems Default deny approach Firewall, App Control,, multi-layered Divert Attackers Gain time and knowledge Honeypots, Stealth layers,.. Prevent Incidents On Network, System, Application level Signature & behavioral prevention IT Security Experts Onsight External Use 20
21 Detect Incidents Shorten time to limit damage and loss of information Anomalies from normal patterns of behavior Connections from/to know bad entities Continuous Analytics Prioritize Risk Confirm risk with internal/external context Prioritize by risk to the enterprise Contain Incidents Isolate compromised systems, accounts,.. Prevent further incidents using same method IT Security Experts Onsight External Use 21
22 Investigate/Forensics Forensics, root cause and full scope analyses Retrospective analyses (motivation, what happened) Analyses of historical data with new insights Design/Model Change Prevent new attacks or reinfection of systems Design changes of policies or controls Remediate/Make change Implementation of change Enforcement of new policies and controls into firewall, IPS, Applications, network,. IT Security Experts Onsight External Use 22
23 Onsight SensorNet Continuous monitoring of customer s IT assets Systems, Apps, Users, Packets, Data, Flows,. Security Intelligence using visibility and real-time correlation (OSIX) Onsight SOC Multi-Domain SOC MSS Onsight DCs Collector + Sensor Collector + Sensor Collector + Sensor Mngmnt Customers Sensor Sensor Sensor Sensor FW, IDS,.. Customer A B C IT Security Experts Onsight External Use 24
24 Onsight SensorNet Asset Discovery Vulnerability Assessment Threat Detection Behavioral Monitoring Packet Capturing Log Collection IT Security Experts Onsight External Use 25
25 Onsight Security Intelligence exchange OSIX Threat Intelligence Signatures, Correlation Rules, Emerging Threats Community Intelligence OTX, IP reputation, Vendor Labs: RSA, Security Information: Advisories, News, NCSC, SANS,.. Vulnerability Information CVE, Zero-day,.. Context : GeoIP, Date, User, IT Security Experts Onsight External Use 26
26 Challenges People, Processes & Technology IT Security Experts Onsight External Use 28
27 Challenges People Authority and mandate Multiple disciplines/roles, limited resources Motivation and commitment Skills, experience and knowledge Organization: Career, position and salary Security clearance and background checks Communication skills (technical to business) IT Security Experts Onsight External Use 29
28 Challenges People IT Security Experts Onsight External Use 30
29 Challenges Processes Standards and processes Incident Response Continuous Response Integration of SOC processes into business processes Responsibility, authority and commitment Both technical and communication protocols Strict procedures versus flexibility Lenghty procedures versus fast response Innovation (Onsight Labs) IT Security Experts Onsight External Use 31
30 Challenges Processes Operational Analytical Business & Technology Call out Case Management Event Handling Monitoring On-boarding Shift Log Shift Turn Over Triage Event Analysis Incident Response Reporting Research Threat Intelligence Access Management Architecture Compliance DR/BCP Process Improvement Use Cases IT Security Experts Onsight External Use 32
31 Challenges Technology Tooling needed for monitoring, reporting, alarms, tickets, triage and forensics Integrate tooling with external security data Management of tooling (functional and technical) Big Data analytics IT Security Experts Onsight External Use 33
32 Challenges Other Defining business value of IT assets Legal challenges (privacy,..) Knowledge transfer Legacy aspects Interfacing to the business Budget versus investments, ROI Innovation of all layers IT Security Experts Onsight External Use 34
33 Challenges SOC as a Service Trust Expectations Connecting the service to your processes Responsibility and mandate Outsource your SOC does not outsource your responsibility Teamwork and commitment Management and coordination IT Security Experts Onsight External Use 35
34 Enterprise SOC or SOC as a Service IT Security Experts Onsight External Use 36
35 Thank you! Any questions? IT Security Experts Onsight External Use 38
36 IT Security Experts Onsight External Use 39
Vendor Risk Management
Vendor Risk Management Using Big Data Analytics Marcel Knippen Onsight IT Security Experts IT Security Experts Onsight External Use 2 About Marcel Knippen Founder of Onsight Business Development About
More informationKeeping EGI secure. EGI CSIRT: Prevention - Response - Training
Keeping EGI secure EGI CSIRT: Prevention - Response - Training Keeping EGI secure EGI CSIRT: Prevention - Response - Training EGI is a federated e-infrastructure set up to provide advanced computing, storage
More informationWhere and How Data is Stored
Where and How Data is Stored Technology The OpenWater Platform is a proprietary system built on Microsoft.NET technologies. Its basis is 100% custom and is not derived from a popular system (e.g. DotNetNuke).
More informationEX0-008 exin. Number: EX0-008 Passing Score: 800 Time Limit: 120 min.
EX0-008 exin Number: EX0-008 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 Which statement describes Release Planning? A. After looking at all the stories in the backlog, the team estimates
More informationThreats From Within Are Now the #1 Concern for Most Healthcare Organizations
Helen Blake, Executive Director, HIPAA Privacy and Security Office Client Profile The University of Miami Miller School of Medicine is comprised of three hospitals and a clinic system, serving more than 5
More informationWHITE PAPER A Framework for Cyber Threat Hunting
WHITE PAPER A Framework for Cyber Threat Hunting Sqrrl Data, Inc. 2016 All Rights Reserved TABLE OF CONTENTS I. INTRODUCTION - WHAT IS HUNTING? II. THE HUNTING MATURITY MODEL A. STEPS OF THE HMM B. AUTOMATION
More informationHow to Define Your Systems and Assets to Support Reliability. How to Define Your Failure Reporting Codes to Support Reliability
BACKFED RELIABILITY How to Define Your Systems and Assets to Support Reliability How to Define Your Failure Reporting Codes to Support Reliability How to Generate Risk Prioritization Numbers (RPN) from
More informationThe Myth of Automated Hunting and Case Studies in ICS
SANS Summit The Myth of Automated Hunting and Case Studies in ICS @DragosInc Who Are We Robert M. Lee @RobertMLee CEO and Founder, Dragos, Inc. SANS Institute Certified Instructor and Course Author (FOR578
More informationDigital empowerment for the Olympic Games
Digital empowerment for the Olympic Games Trusted partner for your Digital Journey Turning the Games into a fully connected global experience Some business projects are large, complex, and critical to
More informationAccelerate Your Riverbed SteelHead Deployment and Time to Value
SteelHead Implementation Service Accelerate Your Riverbed SteelHead Deployment and Time to Value Proven Methodologies to Increase Adoption and Utilization Your organization has selected SteelHead appliances
More informationHunt Evil Your Practical Guide to Threat Hunting
Hunt Evil Your Practical Guide to Threat Hunting Includes checklist, scorecard and examples Hunt Evil: Your Practical Guide to Threat Hunting 3 Chapters Part 1 Setting up your threat hunting program 1.
More informationThe Hunter s. Handbook. Karen Scarfone, CISSP, ISSAP. Foreword by Jamie Butler. Endgame s Guide to Adversary Hunting
The Hunter s Handbook Endgame s Guide to Adversary Hunting Karen Scarfone, CISSP, ISSAP Foreword by Jamie Butler The Hunter's Handbook Endgame's Guide to Adversary Hunting Published by: CyberEdge Group,
More informationConnect with Confidence NO POWER NO PROBLEM
Connect with Confidence NO POWER NO PROBLEM The ideal solution to implement wireless sensor monitoring in IoT applications where power is not available. At last, there s a roll-out ready way to implement
More informationPrivacy Auditing in a Mixed McKesson Application Environment
Privacy Auditing in a Mixed McKesson Application Environment Presentation materials in-line below The webinar replay link is available here June 11 th, 2009 FairWarning Trust but Verify http://www.fairwarningaudit.com
More informationIntelligent SUNTEX DC-5310(RS) Dissolved Oxygen Transmitter
Intelligent SUNTEX DC-5310(RS) Dissolved Oxygen Transmitter Overview C % ppm 4~20mA Analog Output ppb Power Supply 100~240 VAC mg/l Dimensions 96 x 96 x 132mm RS-485 Digital Output (for DC-5310-RS only)
More informationApplication Note AN-107
SPEC Sensor TM Characterization & Calibration Considerations Scope This document is provided to describe the considerations needed to characterize, calibrate, verify and validate the measurement performance
More informationRCM CHIEF EXECUTIVE OFFICER & GENERAL SECRETARY Job Description and Person Specification
RCM CHIEF EXECUTIVE OFFICER & GENERAL SECRETARY Job Description and Person Specification PURPOSE AND CONTEXT OF THE ROLE The key purpose of the Chief Executive will be to enhance the RCM s unique position
More information<:\_J Senior Manager- Safety, Security & Emergency Response. Ell ORIGINAL DELIVERED BY COURIER. June 7, 2017
ORIGINAL DELIVERED BY COURIER June 7, 2017 National Energy Board Suite 210, 517-10 th Avenue SW Calgary, Alberta T2R 0A8 Ell J 111 ' - 7 I Attention: Ms. Sheri Young Secretary of the Board Dear Ms. Young:
More informationAECAC 1 POSITION PAPER ON THE REVISION OF THE FIREARMS DIRECTIVE
AECAC 1 POSITION PAPER ON THE REVISION OF THE FIREARMS DIRECTIVE CONTEXT By tabling a legislative proposal to amend the Firearms Directive, the Commission is putting forward a number of restrictions concerning
More informationAdaptability and Fault Tolerance
Adaptability and Fault Tolerance Rogério de Lemos University of Kent, UK Context: self-* and dependability; Focus: adaptability and fault tolerance; State of the art; Conclusions; Rogério de Lemos ICSE
More informationThe Near Miss Project: Quantifying Cyclist Comfort and Safety
The Near Miss Project: Quantifying Cyclist Comfort and Safety Thoughts on research, monitoring, and practice r.aldred@westminster.ac.uk Rachel Aldred rachelaldred.org @RachelAldred Content of talk Why
More informationWEALTH MANAGEMENT: ON YOUR TERMS
WEALTH MANAGEMENT: ON YOUR TERMS YOUR VISION FOR THE FUTURE While you actively build your personal wealth, it is also important to consider how you will protect those assets, generate income from them
More informationHigh usability and simple configuration or extensive additional functions the choice between Airlock Login or Airlock IAM is yours!
High usability and simple configuration or extensive additional functions the choice between Airlock Login or Airlock IAM is yours! Airlock Login Airlock IAM When combined with Airlock WAF, Airlock Login
More information2. Vision & Goals. Vision. Santa Rosa is a community where walking and bicycling are comfortable and convenient for people of all ages and abilities.
2. Vision & Goals Overview The goals of the Santa Rosa Bicycle and Pedestrian Master Plan Update reflect the priorities expressed by the community throughout the public outreach phase of this Plan Update.
More informationINTRODUCTION UNIFIED COMMAND
INTRODUCTION The Hazardous Materials organizational module is designed to provide an organizational structure that will provide necessary supervision and control for the essential functions required at
More informationTLN WRO Document. Back to Back CAS support
TELENET N.V. Page 1 of 8 TLN-WRO_GA_P_O_PDAA TLN WRO Document Back to Back CAS support TELENET N.V. Page 2 of 8 TLN-WRO_GA_P_O_PDAA Document Category and type CAT TYPE DOC ID TV General TLN_WRO_GA_P_O_PDAA
More informationABRAXAS CORPORATION Date created: 2009 Updated: 2012
ABRAXAS CORPORATION Date created: 2009 Updated: 2012 An intelligence contractor profile by Tim Shorrock, adapted from his book SPIES FOR HIRE: Inside the Secret World of Intelligence Outsourcing (Simon
More informationRole Profile. Chief Executive of Blackburn Youth Zone. Chair and Board of Blackburn Youth Zone
Role Profile Job Role: Accountable to: Key Relationships: Chief Executive of Blackburn Youth Zone Chair and Board of Blackburn Youth Zone Youth Zone Chair and Board, Youth Zone Senior Management Team,
More informationTop Tips to Mitigate. Food Fraud COPYRIGHT ALL RIGHTS RESERVED.
Top Tips to Mitigate Food Fraud COPYRIGHT 2017. ALL RIGHTS RESERVED. Today s Speakers Peter Claise Marketing Director Foods Programs Jeff Chilton Vice President of Professional Services Today s Discussion
More informationWhy walk? Introducing Heart Foundation Walking! What is Heart Foundation Walking? Your role. Host Organisation
An Introduction Why walk? It s an inexpensive form of physical activity It s easy doesn t require special skills or equipment It has psychological and community benefits improves mental health and social
More informationCity of Redlands Disaster Council Minutes. Monday January 26 th, 2015 City Council Chambers 35 Cajon Street Redlands, CA 92373
City of Redlands Disaster Council Minutes INTRODUCTIONS: Monday January 26 th, 2015 City Council Chambers 35 Cajon Street Redlands, CA 92373 Meeting called to order at 3:00pm Fay Glass welcomed everyone
More informationScrum Portfolio jumshat.com
Scrum Portfolio jumshat.com SCRUM is an iterative and incremental agile framework for managing complex projects. A scrum (short for scrummage) is a method of restarting play in rugby football. SCRUM Scrum
More informationPurpose and Need. For the. Strava Bicycle Data Project
Purpose and Need For the Strava Bicycle Data Project April 2014 ODOT Strava Workgroup Margi Bradway*, Active Transportation Section Alex Bettenardi*, Transportation Planning Analysis Unit Phil Smith*,
More informationAustralian Ice Hockey League Limited Privacy Policy
Australian Ice Hockey League Limited Privacy Policy 1. AIHL Australian Ice Hockey League Ltd (ACN 114 658 123) of GPO Box 329, Melbourne VIC 3001 (AIHL) is the administrator of the Australian Ice Hockey
More informationIMD Governance Review at a glance
IMD Governance Review at a glance Good Governance at the International Olympic Committee Summary of recommendations 07 July 2017 1 Introduction IMD was officially contracted by the International Olympic
More informationT&E M&S War Game Results. Jim Hazlett Director, Mission Profiling Mission Innovation Raytheon Integrated Defense Systems
T&E M&S War Results Jim Hazlett Director, Mission Profiling Mission Innovation Raytheon Integrated Defense Systems Overview Purpose: Recent seminar war game for modeling and simulation (M&S) sponsor to
More informationPedestrian Dynamics: Models of Pedestrian Behaviour
Pedestrian Dynamics: Models of Pedestrian Behaviour John Ward 19 th January 2006 Contents Macro-scale sketch plan model Micro-scale agent based model for pedestrian movement Development of JPed Results
More informationCommon Myths of Gun Facts
California Rifle & Pistol Association is one of the oldest and most well-established civil rights and education organizations in the nation. The main goal of CRPA is to protect the rights of Californians
More informationINTERNATIONAL FOUNDATION MANIFESTA BID PROCEDURE MANIFESTA 14, 2022 VERSION 2 NOVEMBER 2016
INTERNATIONAL FOUNDATION MANIFESTA BID PROCEDURE MANIFESTA 14, 2022 VERSION 2 NOVEMBER 2016 2 1 MANIFESTA, THE EUROPEAN BIENNIAL OF CONTEMPORARY ART 1.1 Introduction Manifesta, the European Biennial of
More informationINTERNATIONAL ASSOCIATION OF ATHLETICS FEDERATIONS
INTERNATIONAL ASSOCIATION OF ATHLETICS FEDERATIONS ADVISORY NOTE USE OF PERSONAL INFORMATION Introduction 1. The IAAF is responsible for ensuring that the Personal Information that it processes in connection
More informationCONFLICT OF INTEREST POLICY
Page 1 of 9 Version V01 10 December 2015 Page 2 of 9 Conflict of Interest Policy Version 01 Short description Relevant to Authority Responsible Unit/Department Policy on conflict of interests for IRB Barcelona
More informationStrategic Plan Update
Archery GB 2017 Membership Conference The Future of our Sport Strategic Plan Update 2016-2020 Neil Armitage Chief Executive Vision Achieve. Grow. Believe. Mission Lead, grow and promote archery to create
More information2013 Special Reliability Assessment: Accommodating an Increased Dependence on Natural Gas for Electric Power
2013 Special Reliability Assessment: Accommodating an Increased Dependence on Natural Gas for Electric Power Special Reliability Assessments Deeper focus on issues identified in Long-Term Reliability Assessment
More informationIAAF ADVISORY NOTE USE OF PERSONAL INFORMATION (ANTI-DOPING AND INTEGRITY PROGRAMMES)
IAAF ADVISORY NOTE USE OF PERSONAL INFORMATION (ANTI-DOPING AND INTEGRITY PROGRAMMES) Introduction 1. The objects of the IAAF include (i) to develop and maintain programmes of detection, deterrence and
More informationGlobal Certifying Authority for Scrum and Agile Professionals
Global Certifying Authority for Scrum and Agile Professionals SCRUM is an iterative and incremental agile framework for managing complex projects. A scrum (short for scrummage) is a method of restarting
More informationPRESSURE SYSTEMS POLICY
PRESSURE SYSTEMS POLICY PRESSURE SYSTEMS POLICY 1. Introduction 2. Policy Statement 3. Scope 4. Background 5. Roles & Responsibilities 6. Training 7. Contractors 8. Policy Review 1. Introduction The Kilmarnock
More informationGlobal Certifying Authority for Scrum and Agile Professionals. Authorized Training Partner
Global Certifying Authority for Scrum and Agile Professionals Authorized Training Partner SCRUM is an iterative and incremental agile framework for managing complex projects. A scrum (short for scrummage)
More informationONSIGHT FIREWALL CONFIGURATION GUIDE
ONSIGHT FIREWALL CONFIGURATION GUIDE Librestream Onsight Firewall Configuration Guide Doc #: 400295-03, rev A January 2019 Information in this document is subject to change without notice. Reproduction
More informationONSIGHT FIREWALL CONFIGURATION GUIDE
ONSIGHT FIREWALL CONFIGURATION GUIDE Librestream Onsight Firewall Configuration Guide Doc #: 400295-01, rev A January 2018 Information in this document is subject to change without notice. Reproduction
More informationCEPA Initiative: Response Time Guideline 2015 EMERGENCY SECURITY MANAGEMENT WORK GROUP
CEPA Initiative: Response Time Guideline 2015 EMERGENCY SECURITY MANAGEMENT WORK GROUP Response Time Guideline aboutpipelines.com 1 of 8 Contents Table of Contents 1.0 Background 3 Purpose 3 Scope 3 Definitions
More informationAsset Integrity. We must have effective asset integrity management.
Asset Integrity We must have effective asset integrity management. follow us Mon a ktwitter i n g t h@stepchangeinfo e U K t h e s a f e s t p l a c e t o w o r k i n t h e w o r l d w i d e o i l a n
More informationUse case Behind the scenes Holland Heineken House during the Olympic Winter Games PyeongChang 2018
Use case Behind the scenes Holland Heineken House during the Olympic Winter Games Our standards for the Holland Heineken House are exceptionally high. We offer a wide range of amenities, including catering,
More informationPIQCS HACCP Minimum Certification Standards
PIQCS HACCP Minimum Certification Standards In the EU, requirements for the hygiene of food is laid down in Regulation (EC) 852/2004. This regulation establishes general hygiene procedures for food at
More informationWe re Blue Marlin Systems, a global provider of On-site and Offsite IT Outsourcing services.
We re Blue Marlin Systems, a global provider of On-site and Offsite IT Outsourcing services. O V E R V I E W Our mission, quite simply, is to form strategic alliances with our customers. We do so by providing
More informationfuture of mbe/mde/ mdd in the industry -- Open source is the only solution!
future of mbe/mde/ mdd in the industry -- Open source is the only solution! Presented by Francis Bordeleau francis.bordeleau@ericsson.com Outline Ericsson intro Modeling context Why open source? Impact
More informationAgile Methodology (Scrum Approach)
Agile Methodology (Scrum Approach) Scrum is a team of eight individuals in Rugby. Everyone in the pack acts as one with everyone else, to move the ball down the field in small incremental steps. Teams
More informationHazMat Response and Decontamination Exercise Evaluation Guide
Exercise Evaluation Guide Submittal HazMat Response and Decontamination Exercise Evaluation Guide As the evaluator you will need to submit your Observations, Recommendations and Performance Ratings into
More informationCONTINUITY OF SERVICE PLAN FOR THE LRIT SYSTEM
E 4 ALBERT EMBANKMENT LONDON SE1 7SR Telephone: +44 (0)20 7735 7611 Fax: +44 (0)20 7587 3210 CONTINUITY OF SERVICE PLAN FOR THE LRIT SYSTEM MSC.1/Circ.1376/Rev.2 21 November 2014 1 The Maritime Safety
More informationTHE NEW SPORTS ECOSYSTEM STEFAN KUERTEN EXECUTIVE DIRECTOR EBU SPORT
THE NEW SPORTS ECOSYSTEM STEFAN KUERTEN EXECUTIVE DIRECTOR EBU SPORT TRADITIONAL PLAYERS GOING GLOBAL There are a lot of experienced sharks out there Sky BeIn Sports Discovery Sports Agencies NEW PLAYERS
More informationLecturers. Multi-Agent Systems. Exercises: Dates. Lectures. Prof. Dr. Bernhard Nebel Room Dr. Felix Lindner Room
Lecturers Multi-Agent Systems Prof. Dr. Bernhard Nebel Room 52-00-028 Phone: 0761/203-8221 email: nebel@informatik.uni-freiburg.de Albert-Ludwigs-Universität Freiburg Dr. Felix Lindner Room 52-00-043 Phone:
More informationBODY-WORN CAMERAS ARE PAVING THE WAY FOR BETTER TRANSPARENCY AND A PROMISING FUTURE IN MUSKEGON HEIGHTS CASE STUDY MUSKEGON HEIGHTS POLICE DEPARTMENT
BODY-WORN CAMERAS ARE PAVING THE WAY FOR BETTER TRANSPARENCY AND A PROMISING FUTURE IN MUSKEGON HEIGHTS CASE STUDY MUSKEGON HEIGHTS POLICE DEPARTMENT THE CHALLENGE IMPROVING PUBLIC SAFETY DESPITE BUDGET
More informationCurrent Bid Advertisements for Murray State University
Current Bid Advertisements for Murray State University Invitation to Bid/RFP # Advertisement Date Bid Advertisement Opening Date Opening Time Comments / Addendums MUR-268H-18 May 30, 2018 PROMOTIONAL PRODUCTS.
More informationGlobal Banking Issues and the Impact on Financial Services in The Bahamas. Presented by Governor John Rolle IBFS Summit 2 nd March, 2018
Global Banking Issues and the Impact on Financial Services in The Bahamas Presented by Governor John Rolle IBFS Summit 2 nd March, 2018 2 Some High Level Observations Balance sheet adjustments have been
More informationFINAL PLAN APPENDIX D CITY OF BERKELEY BIKE PLAN D-1
CITY OF BERKELEY BIKE PLAN D-1 . Proposed Programs D.1. EDUCATION This appendix presents the recommended bicycle-related programs for the City of Berkeley. The recommendations are organized in four E s:
More informationElectrical, electronic and control engineering at the operational level
STCW Code Table A-III/6 Specification of minimum standard of for electro-technical officers Ref: https://www.edumaritime.net/stcw-code Source: IMO Function: Electrical, electronic and control engineering
More informationD-Case Modeling Guide for Target System
D-Case Modeling Guide for Target System 1/32 Table of Contents 1 Scope...4 2 Overview of D-Case and SysML Modeling Guide...4 2.1 Background and Purpose...4 2.2 Target System of Modeling Guide...5 2.3 Constitution
More informationSome Steps Towards Climate-Ready Management of U.S. Fisheries
Some Steps Towards Climate-Ready Management of U.S. Fisheries Roger Griffis 1, Wendy Morrison 1, Mark Nelson 1, Jon Hare 2, Valerie Termini 3 1 NOAA National Marine Fisheries Service, Silver Spring, MD,
More informationPolicy. The Calico Group. Calico Homes. Calico Enterprise. SafeNet. Acorn Recovery Projects. Whitworth Care Trust
Policy Title: Fencing Policy Author: Beth Gallagher Approved by: Board Date of First Issue: May 2011 Last full review date: February 2014 Updated: January 2016 Date of next review: February 2017 This document
More informationNOTICE: This publication is available at:
Department of Commerce National Oceanic & Atmospheric Administration National Marine Fisheries Service NATIONAL MARINE FISHERIES SERVICE POLICY DIRECTIVE 01-118 February 12, 2015 Fisheries Management NATIONAL
More informationRacecourse Operations Manager. Position Description
Racecourse Operations Manager Position Description Position Discription Racecourse Operations Manager Position Title: Reports To: Business Unit: Department: Racecourse Operations Manager CEO Pakenham Racing
More informationFedRAMP Continuous Monitoring Performance Management Guide. Version 2.0
FedRAMP Continuous Monitoring Performance Management Guide Version 2.0 January 31, 2018 DOCUMENT REVISION HISTORY DATE VERSION PAGE(S) DESCRIPTION AUTHOR 07/22/2015 1.0 All Initial document FedRAMP PMO
More informationSection 12. Information Technology (IT)
Section 12 Information Technology (IT) Key findings in the Information Technology (IT) performance measures reported optimistic changes in the respective IT environments for cities and counties alike.
More informationHelicopter Safety Recommendation Summary for Small Operators
Helicopter Safety Recommendation Summary for Small Operators Prepared by the International Helicopter Safety Team September 2009 Introduction This document is intended to provide a summary of the initial
More informationToronto 2015 uses innovative technology to share the spirit of the games.
Toronto 2015 uses innovative technology to share the spirit of the games. The 2015 Pan Am/Parapan Am Games were a major international multisport event that took place over 17 days in July and 9 days in
More informationMINE SAFETY TARGETED ASSESSMENT PROGRAM. Ground or strata failure NSW metalliferous mines. April
MINE SAFETY TARGETED ASSESSMENT PROGRAM Ground or strata failure NSW metalliferous mines April 2017 www.resourcesandenergy.nsw.gov.au Document control Publication title: Ground or strata failure NSW metalliferous
More informationCASE STUDY. Compressed Air Control System. Industry. Application. Background. Challenge. Results. Automotive Assembly
Compressed Air Control System Industry Automotive Assembly Application Savigent Platform and Industrial Compressed Air Systems Background This automotive assembly plant was using over 40,000 kilowatt hours
More informationRaise Your Hand If. Todays Cybersecurity Risks. June 14, WBA BOLT Summer Leadership Summit 1. May 4, 2018
WEALTH ADVISORY OUTSOURCING AUDIT, TAX, AND CONSULTING Investment advisory services are offered through CliftonLarsonAllen Wealth Advisors, LLC, an SEC registered investment advisor Todays Cybersecurity
More informationCRSA Conference Evidence Based Decision Making in European Football
CRSA Conference Evidence Based Decision Making in European Football UEFA Intelligence Centre Topics to cover WHAT is the Intelligence Centre? WHY an intelligence Centre & HOW created? WHAT strategic data
More informationHands-on As a naturalistic data collection method
Hands-on As a naturalistic data collection method Jared Thomas, Darren Walton, Steven Murray, Martin Fourie Contact Information: Central Laboratories Opus International Consultants jared.thomas@opus.co.nz
More informationSecurity & Stability Advisory Committee. Update of Activities
Security & Stability Advisory Committee Update of Activities 1 Topics 1. Overview of the SSAC and Activities -- Patrik Fältström, SSAC Chair 2. Public Comments on SAC053: SSAC Report on Dotless Domains
More informationSan Antonio Police Department. Open Carry Legislation Issues
San Antonio Police Department Open Carry Legislation Issues National Trends in Open Carry Texas is the 45 th state to allow some form of open carry. No permit is required to open carry in 30 states A permit
More informationBoard Strategy Day. January 25, 2018
Board Strategy Day January 25, 2018 Corporate Plan 2018-2022 & beyond Presentation to the board 2018 2022 & beyond 2 Building on the last five-year plan 2013 2017 21% reduction in subway delay minutes
More informationThe RCM Analyst - Beyond RCM
The RCM Analyst - Beyond RCM darylm@strategic-advantages.com About the Author: Daryl Mather was originally trained in RCM in 1991, after which he was involved in the application of the method through a
More informationResource Guide. Copyright 2017 Institute of Certified Management Accountants. Updated 8/30/17
Resource Guide Copyright 2017 Institute of Certified Management Accountants Updated 8/30/17 RESOURCE GUIDE Institute of Certified Management Accountants Certified in Strategy and Competitive Analysis Exam
More informationGuidance Note. NXT Advisors
Guidance Note NXT Advisors February 2015 CONTENTS 1. Introduction 3 2. Accreditation 4 2.1 Application for accreditation 4 2.2 Accreditation process 4 2.3 Ongoing accreditation 5 2.4 Revoking a NXT Advisor
More informationEQUITY POLICY POLICY STATEMENT
EQUITY POLICY POLICY STATEMENT Basketball Ontario, through its Board of Directors, is committed to fostering respect and dignity for each of its employees and members. This policy is intended to guarantee
More informationProcess Safety Journey
Process Safety Journey Agenda The Status in early 2000s The Journey to improvement in Process Safety management Managing risks and barriers How has this impacted Kwinana? The Status in early 2000s Focus
More informationPaper Presentation: COMPLETE AND SIMULTANEOUS DCS FAILURE IN TWO 500MW UNITS
INDIAN POWER STATIONS POWER PLANT O&M CONFERENCE - 2012 Paper Presentation: COMPLETE AND SIMULTANEOUS DCS FAILURE IN TWO 500MW UNITS K C Tripathy, DGM (C&I) Anoop K, Dy Manager (C&I) B K Rathore, Dy Manager
More informationDo you have the energy, drive and passion to deliver transformational growth in cricket participation?
Job Title: Responsible to: Contract: Location: Head of Participation CEO Full-time, permanent Edinburgh Do you have the energy, drive and passion to deliver transformational growth in cricket participation?
More informationToward Zero Deaths: Proactive Steps for Your Community
Est. Dec. 2014 Toward Zero Deaths: Proactive Steps for Your Community Presented by: Brian Roberts, P.E., National Association of County Engineers Marie Walsh, Ph.D., Louisiana Local Technical Assistance
More informationBusiness Plan Presentation
2019 Department of Water Resources Business Plan Presentation Wednesday, August 29, 2018 Mission To Provide Superior Water Services at an Excellent Value Vision To be widely recognized as a leader in the
More informationCITY OF SAINT JOHN TRAFFIC CALMING POLICY
CITY OF SAINT JOHN TRAFFIC CALMING POLICY VERSION: 1.0 April 10, 2012 Pedestrians, Cyclists and Motorists Sharing Street Spaces CONTENTS INTRODUCTION... 3 POLICY GOAL... 3 POLICY OBJECTIVES... 3 GUIDING
More information2013 STORM IMPLEMENTATION PLAN & ANNUAL RELIABILITY PERFORMANCE REPORTS
2013 STORM IMPLEMENTATION PLAN & ANNUAL RELIABILITY PERFORMANCE REPORTS FILED: March 3, 2014 2013 Storm Implementation Plan & Annual Reliability Performance Reports EXECUTIVE SUMMARY... 6 A) Initiative
More informationDistributed Control Systems
Unit 41: Unit code Distributed Control Systems M/615/1509 Unit level 5 Credit value 15 Introduction With increased complexity and greater emphasis on cost control and environmental issues, the efficient
More information2018 RED SOX FOUNDATION ULTIMATE RED SOX RAFFLE OFFICIAL RULES
2018 RED SOX FOUNDATION ULTIMATE RED SOX RAFFLE OFFICIAL RULES PURPOSE & NET PROCEEDS: The Red Sox Foundation, Inc. (hereafter known as Sponsor or Red Sox Foundation ), the official charity of the Boston
More informationROSEE RSA/RSI Introduction courses ROSEE Speed Management courses
ROSEE RSA/RSI Introduction courses ROSEE Speed Management courses ROSEE PP8 UL FGG-PTI & WP4 leader Kostanjsek, Jure & Lipar, Peter Munchen, June 6, 2013 ROSEE WP4: Safe Roads and Mobility RSA/RSI course
More informationHazard Communication Program
Hazard Communication Program I. Purpose, Applicability, and Scope A. Purpose: The purpose of this program is to ensure that the hazards of chemicals used in the workplace are evaluated, and those hazards
More information2018 New York Bike Summit
2018 New York Bike Summit -Education: Beyond the Rules of the Road- Set at the historic Gideon Putnam Hotel in beautiful Saratoga, New York, The 2018 New York State Bike Summit is bigger than ever! This
More informationDockless Cycle Share
Dockless Cycle Share Code of Practice December 2017 135 Albert Street Private Bag 92300, Auckland 1142 aucklandcouncil.govt.nz Ph 09 301 0101 1. Introduction Auckland has seen a significant increase in
More informationA Game Theoretic Study of Attack and Defense in Cyber-Physical Systems
The First International Workshop on Cyber-Physical Networking Systems A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems ChrisY.T.Ma Advanced Digital Sciences Center Illinois at Singapore
More information