The City of Calgary is responsible for providing municipal services to 1.1 million people and 16,000 employees with more than 700 sites and critical infrastructure units. The municipal services represent a $60B asset base including water and wastewater treatment plants, light rapid transit, emergency services, roads and recreation facilities, and has revenue and procurement streams of $4.0B annually. During his tenure, Owen Key, Chief Security Officer and the Chief Information Officer for the City, has implemented enterprise systems for CCTV, access and ID control, physical security information management systems, and has responsibility for information security.
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
For all critical sectors to establish robust and systematic cyber risk management processes and capabilities
Systematic cyber risk management framework
risk assessments, vulnerability assessments and system reviews;
well-informed and conscious trade-offs in security, cost and functionality
sound systems and procedures to mitigate and manage these risks, including disaster recovery and business continuity plans;
effective implementation that encompasses awareness building and training across the organisation
continuous measurement of performance through process audits and cyber-security exercises.
A high-level overview on the digital security of "SYZEFXIS" national telecommunications network, presented at ICT Security Conference, March 4th, 2015, Athens, Greece
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
When the government purchases products or services with inadequate in-built “cybersecurity,” the risks created persist throughout the lifespan of the item purchased. The lasting effect of inadequate cybersecurity in acquired items is part of what makes acquisition reform so important to achieving cybersecurity and resiliency.
Currently, government and contractors use varied and nonstandard practices, which make it difficult to consistently manage and measure acquisition cyber risks across different organizations.
Meanwhile, due to the growing sophistication and complexity of ICT and the global ICT supply chains, federal agency information systems are increasingly at risk of compromise, and agencies need guidance to help manage ICT supply chain risks
Cybersecurity legislation in Singapore (2017)Benjamin Ang
Reviewing the Personal Data Protection Act (PDPA), Computer Misuse and Cybersecurity Act (CMCA), and the draft Cybersecurity Act Cybersecurity Bill of Singapore, correct up to November 2017
Singapore. industry 4.0 and cybersecurity Yuri Anisimov
For all critical sectors to establish robust and systematic cyber risk management processes and capabilities
Systematic cyber risk management framework
risk assessments, vulnerability assessments and system reviews;
well-informed and conscious trade-offs in security, cost and functionality
sound systems and procedures to mitigate and manage these risks, including disaster recovery and business continuity plans;
effective implementation that encompasses awareness building and training across the organisation
continuous measurement of performance through process audits and cyber-security exercises.
A high-level overview on the digital security of "SYZEFXIS" national telecommunications network, presented at ICT Security Conference, March 4th, 2015, Athens, Greece
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
When the government purchases products or services with inadequate in-built “cybersecurity,” the risks created persist throughout the lifespan of the item purchased. The lasting effect of inadequate cybersecurity in acquired items is part of what makes acquisition reform so important to achieving cybersecurity and resiliency.
Currently, government and contractors use varied and nonstandard practices, which make it difficult to consistently manage and measure acquisition cyber risks across different organizations.
Meanwhile, due to the growing sophistication and complexity of ICT and the global ICT supply chains, federal agency information systems are increasingly at risk of compromise, and agencies need guidance to help manage ICT supply chain risks
Cybersecurity legislation in Singapore (2017)Benjamin Ang
Reviewing the Personal Data Protection Act (PDPA), Computer Misuse and Cybersecurity Act (CMCA), and the draft Cybersecurity Act Cybersecurity Bill of Singapore, correct up to November 2017
At the International Municipal Lawyers Association’s annual Spring Meeting in Washington, D.C., we presented “Telecommunications 2016: The Challenges Facing Local Government and its Counsel.”
The I-80 SMART Corridor is changing the way motorists drive on one of the busiest corridors in the Bay Area. Starting in July 2016, we began activating elements of the project gradually to allow motorists time to adjust to the new system. The most familiar elements were introduced first, leading up to full activation of the system in September of 2016.
CNL Software IPSecurityCenter Case Studies Presentation 0113Adlan Hussain
CNL Software’s award winning PSIM technology is deployed to secure major cities, critical infrastructure and global commerce. Our solutions sit at the heart of some of the largest, most complex and ground-breaking security integration projects in the world. Our work with leading organizations is helping to shape the future of security by offering thought leadership on key issues such as asset protection, energy reduction, process compliance and business advantage.
Public safety interoperability: an international perspectiveComms Connect
The paper will discuss a wide range of public safety communications interoperability -related issues both with a view to the Canadian/US environment and their relevance to the Australia/New Zealand landscape.
These include:
- Public safety wireless broadband in North America;
- Public safety interoperability strategic planning at the local, regional, state, national and international levels;
- Trends in interoperability technology, including both voice- and data-related issues;
- Next Generation (NG) 911 and its future in Canada and beyond;
- Situational awareness, common/user-defined operating pictures, precision information environments, GIS systems, blue force tracking and location-based services;
- 3D in-door tracking and location for firefighters and public safety responders; and,
- Social media for emergency management (#SMEM).
Inspector (Ret.) Lance Valcour O.O.M, Chair, Law Enforcement Information Management Section International Association of Chiefs of Police
L'intervento su "infrastrutture critiche e cybersicurezza nel settore dei trasporti" tenuto da Andrea Chiappetta al workshop "Critical Infrastructure protection against hybrid warfare security related challenges" svoltosi a Stoccolma lo scorso maggio.
Dilip Hanumara - Enhancing Quality of Living with Smart Cities.pptxFIWARE
The development of Smart Cities is becoming increasingly important in the creation of intelligent ecosystems. The primary objective of Smart Cities is to enhance the quality of life of citizens while also engaging companies to work towards achieving mission zero. However, the question arises as to how this can be achieved. How can technology, urban needs, and mission zero objectives be effectively interconnected in a city setting?
Learn more about Smart City ecosystems powered by FIWARE, Smart City solutions and technologies to improve citizens life and at the end fulfilling mission zero together by the power of technology.
Be part of a discussion for future cities powered by FIWARE.
Cybersecurity for Real Estate & ConstructionAronson LLC
Aronson’s Tech Risk Partner Payal Vadhani and Construction & Real Estate Partner Tim Cummins spoke at the AICPA’s Construction and Real Estate Conference on December 8-9, 2016 at the Wynn in Las Vegas, NV. Their presentation focuses on how construction contractors and real estate organizations can develop a scalable multi-year cybersecurity strategy. In order for a security culture to be present and truly effective, security awareness and engagement is required at every level of your organization. Payal and Tim’s multi-tiered foundational block approach coupled with governance and culture will provide you and your organization with a roadmap for success and a customized cybersecurity program based on the industry, business needs, regulatory requirements, and specific business and cyber risks.
ITS is the system defined as the electronics, advanced technology, communications or information processing used singly or integrated to enhance safety, mobility, and the economic vitality of the surface transportation system. The Intelligent Transport Systems (ITS) makes automobiles and the road traffic infrastructure intellectual and information-oriented in an integrated way to provide a safe and comfortable traffic system.
At the International Municipal Lawyers Association’s annual Spring Meeting in Washington, D.C., we presented “Telecommunications 2016: The Challenges Facing Local Government and its Counsel.”
The I-80 SMART Corridor is changing the way motorists drive on one of the busiest corridors in the Bay Area. Starting in July 2016, we began activating elements of the project gradually to allow motorists time to adjust to the new system. The most familiar elements were introduced first, leading up to full activation of the system in September of 2016.
CNL Software IPSecurityCenter Case Studies Presentation 0113Adlan Hussain
CNL Software’s award winning PSIM technology is deployed to secure major cities, critical infrastructure and global commerce. Our solutions sit at the heart of some of the largest, most complex and ground-breaking security integration projects in the world. Our work with leading organizations is helping to shape the future of security by offering thought leadership on key issues such as asset protection, energy reduction, process compliance and business advantage.
Public safety interoperability: an international perspectiveComms Connect
The paper will discuss a wide range of public safety communications interoperability -related issues both with a view to the Canadian/US environment and their relevance to the Australia/New Zealand landscape.
These include:
- Public safety wireless broadband in North America;
- Public safety interoperability strategic planning at the local, regional, state, national and international levels;
- Trends in interoperability technology, including both voice- and data-related issues;
- Next Generation (NG) 911 and its future in Canada and beyond;
- Situational awareness, common/user-defined operating pictures, precision information environments, GIS systems, blue force tracking and location-based services;
- 3D in-door tracking and location for firefighters and public safety responders; and,
- Social media for emergency management (#SMEM).
Inspector (Ret.) Lance Valcour O.O.M, Chair, Law Enforcement Information Management Section International Association of Chiefs of Police
L'intervento su "infrastrutture critiche e cybersicurezza nel settore dei trasporti" tenuto da Andrea Chiappetta al workshop "Critical Infrastructure protection against hybrid warfare security related challenges" svoltosi a Stoccolma lo scorso maggio.
Dilip Hanumara - Enhancing Quality of Living with Smart Cities.pptxFIWARE
The development of Smart Cities is becoming increasingly important in the creation of intelligent ecosystems. The primary objective of Smart Cities is to enhance the quality of life of citizens while also engaging companies to work towards achieving mission zero. However, the question arises as to how this can be achieved. How can technology, urban needs, and mission zero objectives be effectively interconnected in a city setting?
Learn more about Smart City ecosystems powered by FIWARE, Smart City solutions and technologies to improve citizens life and at the end fulfilling mission zero together by the power of technology.
Be part of a discussion for future cities powered by FIWARE.
Cybersecurity for Real Estate & ConstructionAronson LLC
Aronson’s Tech Risk Partner Payal Vadhani and Construction & Real Estate Partner Tim Cummins spoke at the AICPA’s Construction and Real Estate Conference on December 8-9, 2016 at the Wynn in Las Vegas, NV. Their presentation focuses on how construction contractors and real estate organizations can develop a scalable multi-year cybersecurity strategy. In order for a security culture to be present and truly effective, security awareness and engagement is required at every level of your organization. Payal and Tim’s multi-tiered foundational block approach coupled with governance and culture will provide you and your organization with a roadmap for success and a customized cybersecurity program based on the industry, business needs, regulatory requirements, and specific business and cyber risks.
ITS is the system defined as the electronics, advanced technology, communications or information processing used singly or integrated to enhance safety, mobility, and the economic vitality of the surface transportation system. The Intelligent Transport Systems (ITS) makes automobiles and the road traffic infrastructure intellectual and information-oriented in an integrated way to provide a safe and comfortable traffic system.
This is the presentation delivered by Vladimiro Sassone, The Director of Academic Centre of Excellence in Cyber Security at the University of Southampton. Vladimiro is also a professor of Computer Science in ECS (Electronics and Computer Science), also at the University of Southampton.
RSITS: Road safety Intelligent Transport System in Deep Federated Learning As...Abdullah Raza
In smart cities, the frequency of traffic collisions has been rising daily.
More than half of all traffic-related deaths and injuries happen to people most vulnerable on the road. According to the World Health Organization report published
in 20182022, 1.3 million people died due to accidents on the road due to vehicles, and
30 to 50 million were injured. To address this issue, we present the road safety intelligent transport system (RSITS) based on deep federated learning-assisted fog cloud
networks. RSITS offers mobile LiDAR sensors and vehicle LiDAR sensors enabled
applications to alert road safety mechanisms. To deal with the complex features of
road safety, we trained the large pedestrian and vehicle detection dataset on different
road safety fog servers and aggregated them on the centralized cloud. To ensure that
constraints such as safety, the accuracy of alarms, response times, security, and deadlines are met, we present a deep federated learning scheduling scheme (DFLSS) that
consists of different components: Initially, we bound all applications so that emergency tasks, such as moving an object within 5 meters, should be processed locally
with the minimum response time. Due to resource constraints and the limitations of
devices, other tasks of applications are offloaded to the centralized cloud for processing. To ensure security, each computing node must encrypt and decrypt data before
offloading and processing it in DFLSS. Simulation results show that the proposed
DFLSS outperformed all existing approaches regarding accuracy, response time, and
deadline for road safety applications.
A CCTV system is not a physical barrier. It does not limit access to certain areas, make an object harder to steal, or a person more difficult to assault and rob. This does not mean it is not an example of situational crime prevention. It is highly situational, and as will be shown, does have some crime prevention capacity in the right situations. Although CCTV has many functions, the primary preventative utility is to trigger a perceptual mechanism in a potential offender. It seeks to change offender perception so the offender believes if he commits a crime, he will be caught. In other words, CCTV aims to increase the perceived risk of capture, a factor which, assuming the offender is behaving in a rational (or limited rational) manner, will de-motivate the potential offender. For this crime prevention process to succeed. So we developed this prototype which shows improved results in terms of crime reporting by the public using mobile devices and improved management of reports due to automation of crime reporting and monitoring. Pankaj Sharma | Parikshit Jhala | Nirmal Mathur | Jagtar Singh" Video Crime Monitoring" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd3544.pdf http://www.ijtsrd.com/computer-science/real-time-computing/3544/-video-crime-monitoring/pankaj-sharma
Cyber Summit 2016: Technology, Education, and DemocracyCybera Inc.
What are the opportunities and the challenges offered by emerging modes of technologically-inflected communication and decision-making? What is our role and responsibility as educators and as developers of research and teaching digital infrastructures? What do students need in the 21st century? As education institutions and providers struggle to respond to the first two questions, are we abrogating our responsibility to the last?
In this talk, Matt Ratto will describe some of the opportunities and the challenges we currently face, laying out a model of action for how to potentially address the questions raised above. Core to his thinking are two related points; first that we must help students develop a greater sense of how the informational world and its attendant infrastructures helps shape how and what we think, and second, that a good way to do this is to give students the space to engage in reflexive acts of technological production – what Matt has termed ‘critical making.’ He will provide concrete examples from both his research and his teaching that demonstrate the value and importance of reflexive, hands-on work with digital technologies in helping students develop the critical digital literacy skills they need to function in today’s society.
Matt Ratto is an Associate Professor in the Faculty of Information at the University of Toronto and directs the Semaphore Research cluster on Inclusive Design, Mobile and Pervasive Computing and, as part of Semaphore, the Critical Making lab.
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCybera Inc.
There is a prevailing belief that users are the weakest link the security chain. In this presentation, Dr. Chiasson discusses how this perspective is inherently counterproductive to achieving increased cyber security and explore alternatives with a higher chance of improving security. Why do users behave insecurely even though most will readily state that security and privacy are important? This talk will cover some of our recent research exploring reasons why users' actions do not necessarily reflect their desire for security and how the configuration of security systems may actually weaken security in practice. She presents her work using eye-tracking to determine how users make phishing determinations, and how we can persuade users to behave more securely through improving their mental models of passwords and by making adjustments to the system configurations.
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCybera Inc.
Serious threats to private and governmental organizations do not only come from the outside world, but also come from within. Some employees and contractors with legitimate access to buildings, networks, assets and information deliberately misuse their priviledged access to cause harm to their organization. What are the reasons behind their actions? Is it debts, greed, ideology, disgruntlement, or divided loyalty?
Regardless of their motivations or vulnerabilities, traitors have very similar types of personality and display a certain pattern of behaviours before committing an insider incident. As a prevention measure, it is vital that organizations and employees understand, recognize and detect the common indicators of insider threat. Would you recognize the signs?
Mario Vachon is an Insider Threat Security Specialist with the RCMP Departmental Security Branch.
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCybera Inc.
Canada allocates a substantial amount of public funding to research, which is a critical factor in ensuring we remain innovative and competitive. Increasingly this funding is geared to the support and development of digital research infrastructure (DRI), including the underlying networks and the associated data acquisition, storage, analysis and visualization. In order to maximize the benefits of increasingly complex DRI and the research it facilitates, it is important to make sure data is properly stewarded, accessible and reusable. By adopting appropriate approaches to research data management we are better positioned to respond to challenges, such as effectively measuring research impacts, and ensuring the reproducibility, privacy, and security of research outputs.
Research Data Canada (RDC) is a member-driven organization committed to developing a sustainable approach to research data management, one based on interoperability and best practices. This session will provide an update on the efforts of RDC and partner organizations, including: CANARIE, Compute Canada, CARL Portage Network, CASRAI, the TriAgencies, and the Leadership Council for Digital Infrastructure. Intersections with international activities and projects will also be highlighted. These efforts are ultimately designed to faciliate a cohesive national approach to research data management, and one based on a clearly articulated vision for supporting innovation and discovery in Canada.
Mark Leggott is the Executive Director of Research Data Canada.
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCybera Inc.
The Internet has revolutionized how — and how much — each of us can know. Our digital tools put the knowledge of the world at our fingertips — and soon, maybe, right into our heads. But what kinds of of knowledge do our devices give us, and how are they reshaping and challenging the role that education and libraries should play in our lives?
This talk was delivered by Michael Patrick Lynch, professor of philosophy at the University of Connecticut, where he directs the university’s Humanities Institute.
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCybera Inc.
Although there is no well-established definition of big data, its main characteristic is its sheer volume. Large volumes of data are generated by people (e.g., via social media) and by technology, including sensors (e.g., cameras, microphones), trackers (e.g., RFID tags, web surfing behavior) and other devices (e.g., mobile phones, wearables for self-surveillance/quantified self), whether or not they are connected to the Internet of Things. However, the large volumes of data needed to capitalize on the benefits of big data can to some extent also be established by the reuse of existing data, a source that is sometimes overlooked.
Data can be reused for purposes similar to that for which it was initially collected, but also beyond these purposes. Similarly, data can be reused in its original context, but also beyond this context. However, such repurposing and recontextualizing of data may lead to privacy issues. For instance, data reuse may lead to issues regarding informed consent and informational self-determination. When the data is used for profiling and other types of predictive analytics, also issues regarding stigmatization and discrimination may arise. This presentation by Bart Custers, Head of Research, eLaw – Center for Law and Digital Technologies at Leiden University, The Netherlands, focuses on the privacy issues of big data sharing and reuse and how these issues could be addressed.
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cybera Inc.
Stephen Childs was hired by the University of Calgary to develop an individual-level predictive model mapping students' decisions to attend the University. In his experience, the higher education sector was slow to use all the data it has available, but this is now changing.
As interest in making use of organizational data grows, staff must consider how these models will be used, and any problems that could arise. When individual predictions become the basis for decisions, how do we ensure our algorithms don't make existing problems worse? A framework for handling these issues now will let organizations handle these issues in a way that is consistent with their values.
Given the culture of today's institutions, and the success of predictive analytics in other fields, there is no doubt that these tools will be used. These techniques can improve student success and the competitiveness of educational organizations, but the benefits should not be gained at the expense of individuals within the system. This talk will propose a set of best practices for using institutional data for predictive modelling to address equity, privacy and other concerns. We must start thinking of this now, before other practices become entrenched.
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...Cybera Inc.
Canada’s National Research and Education Network, like other ultra-speed research networks, has evolved to transfer massive amounts of data at 100Gbps and beyond. But with the volume of data traffic growing at more than 50% per year, the ability to move increasing volumes of data is challenging. What are the kinds of applications in research and education that are driving this growth? What are the implications of the coming data tsunami on our communication networks? And what happens to network economics to keep up with the demand? CANARIE’s Chief Technology Officer, Mark Wolff, explores these topics and offer insights into how the NREN will evolve to continue to meet the unique needs of Canada’s research and education community.
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cybera Inc.
The law has long struggled to keep pace with the rapid change that comes with the Internet and new technologies. From the cross-border challenges posed by a global network to the privacy implications of big data, law and policy simply cannot move at “Internet speed.” Yet despite the difficulties, politicians and policy makers increasingly find themselves at the heart of emerging policy issues, asked to address the balance between privacy and surveillance, the competing copyright interests of creators and users, and the market structure for network providers and disruptive competitors. This keynote talk will explore the emerging law and policy challenges, highlighting how all Internet users have the opportunity to help shape the digital policy landscape. Dr. Michael Geist is a law professor at the University of Ottawa where he holds the Canada Research Chair in Internet and E-commerce Law.
As institutions start to delve into the staff / student / consumer data they have been storing for years, new questions are emerging about the repercussions of using this data. How will it be analyzed? Who is doing the analysis? And what steps should be taken to protect user’s privacy?
Historically, the University of Alberta lacked a centrally managed repository for reporting data, resulting in inconsistency and disparity in access for units across campus. Meaningful and actionable reports were limited, and only focused on the interests and goals of the few units with data analysts who could synthesize the information.
Over the last couple of years, the University of Alberta has undertaken major changes in how information is managed and utilized. At the forefront of this change has been an increased interest in supporting the development of analytics and supporting tools. Beginning with the implementation of a centrally managed data warehouse with self-service capabilities, and the introduction of cloud services with business process analysis tools, the University is just starting down the road of big data.
This presentation explores opportunities and challenges for the University of Alberta in utilizing big data.
Predicting the Future With Microsoft BingCybera Inc.
The next generation of data scientists will be asked to build predictive models that can extract inferences from very large datasets which are unobservable at the surface, even to the best domain experts. Microsoft has access to some truly large data sets, web and search data from the Bing search engine and social data through collaborations with Twitter. In this talk, we show you how a small team of data scientists used this data to build the Bing Predicts engine — a collection of machine learnt predictive models that is beating industry experts at predicting the outcome of events like the Super Bowl, the Oscars, elections and referendums and even breakthroughs in health sciences. The talk will also give a preview of how organizations can adopt a big data mindset to generate and experiment with large data sets and to make amazing predictions using their own data.
Analytics 101: How to not fail at analyticsCybera Inc.
"Data Scientist" is perhaps the hottest job title of recent years. But what is a data scientist? What does a data scientist actually do? And where can they be found? In this talk, presenter Daniel Haight describes the benefits of analytics to decision-making, and explores the characteristics of successful organizations that have fostered their own team of data scientists.
The MOOC movement is only four years old, but has already had a tremendous impact on teaching and learning. While the some of the original hype surrounding MOOCs has not been realized, the reality is that they are here for good and are influencing institutional thinking. This talk will discuss the past, present and future of MOOCs.
While the use of online instructional technologies allows the presentation of theoretical science materials, how do we deal with the fact that such courses often include hands-on labs? Laboratory simulations can only provide a solution for online students in a limited and often artificial way. Nearly 20 years ago, Athabasca University developed a solution to the problem of students having to travel to complete their lab work. Emerging technologies at the time allowed for quantitative physics labs to be sent to students as a small kit. The physics initiative was so successful, with over 5,000 students served, that it was picked up in other fields at Athabasca University.
Over the years, such material has become cheaper, easier to use, and more integrated with modern computers. Athabasca is now pioneering ways to put real labs directly onto the internet. In this session, the methods used to make real lab experiences available to online students will be discussed, and some of them demonstrated.
Canadian municipalities are making great strides when it comes to sharing their data in fun, interactive ways. In this session, presenters will look at cities that are using their data to create useful apps and services for citizens; and describe how all community leaders can get involved to make their municipality more open and accessible.
Data science and the use of big data in healthcare delivery could revolutionize the field by decreasing costs and vastly improving efficiency and outcomes. There is an abundance of healthcare data in Canada, but it is mostly siloed and difficult to access due to privacy and security challenges. This session will offer insights into best practices for healthcare analytics programs, as well as use cases that demonstrate the potential benefits that can be realized through this work.
Checking in on Healthcare Data AnalyticsCybera Inc.
Data science and the use of big data in healthcare delivery could revolutionize the field by decreasing costs and vastly improving efficiency and outcomes. There is an abundance of healthcare data in Canada, but it is mostly siloed and difficult to access due to privacy and security challenges.
Open access and open data: international trends and strategic contextCybera Inc.
Governments around the world fund billions of dollars in research every year. Ensuring that the results of research are available to the public, other researchers and industry has become an important underlying value in order to maximize the impact of our publicly funded research. This session will discuss what’s driving the trend towards greater openness and provide an overview of international developments that will help put Canada’s activities into context.
I didn't know i was a geomatics companyCybera Inc.
This explores the integration of spatial data into our work and personal lives, where it is evolving to, and how spatial information will play a critical role in the next decades. It discusses how companies are innovating new solutions that rely on spatial information, but consider themselves outside the domain of “geomatics companies” and what this means for the ecosystem.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data
1. Issues and Challenges Facing
Municipalities in Data Security
Owen Key
Chief Security Officer
City of Calgary
2. Oct 27, 2016 Cyber Summit 2016 2
City of Calgary - Corporate Security
Protection of assets
Assist other City of Calgary Business Units in providing public safety
initiatives
Promote organizational resilience through collaborative partnerships
which enable and enhance services provided by The City
Approach is to develop and implement innovative approaches in all
areas of security and risk management.
3. Oct 27, 2016 Cyber Summit 2016 3
Corporate
Security
Physical
Security
Technical
Operations
Information
Security
Security
Advisory
Investigations
4. § City of Calgary has over 500 lines of
business and provides services that
range from recreation to transit to
police
§ Complex environment with numerous
touch points, integration with
business partners and third party or
arms length organizations
§ All services are dependant on IT
infrastructure being highly available
§ Duty to safeguard critical
infrastructure to ensure City services
continue
Oct 27, 2016 Cyber Summit 2016 4
City at a Glance
5. Stakeholders
11/1/16 Data Breaches: Causes, Prevention and Containment 5
Calgary
CITIZENS
MAYOR AND
COUNCIL
CITY
MANAGER
AND SENIOR
LEADERSHIP
PARTNER
ORGANIZATION
S
DEPARTMENTS
AND BUSINESS
UNITS
CITY AUDITOR
7. Oct 27, 2016 Cyber Summit 2016 7
• Speed and rate of data creation is
increasing rapidlyData Velocity
• City has multiple discreet data sets in
both structured and unstructured
storage
Data Variety
• Volume of information is explodingData Volume
8. Risk Based Approach to Security
11/1/16 Presentation 8
Risk Evaluation
Risk
Response
Risk
Governance
9. Moving Forward – Laying the Foundations
20/09/2016 Data Breaches: Causes, Prevention and Containment 9
Building up the physical and operational security
showed the value of investing in security
Next layer was to build
a fully integrated
security program
which included cyber
and information
security
10. Implementation – Driving Factors
11/1/16 Presentation 10
Increasingly mobile workforce
Increasing security awareness in key
decision makers
Lack of visibility into our systems
Risk Based approach to business
comes into play
Increasingly interconnected
Increasing public awareness of
Cyber incidents
Increase in Cyber incidents
Calgary experiences large natural
Disaster
Internal Factors External Factors
Need for
Cyber
Security
Program
11. Security through Design
Oct 27, 2016 Cyber Summit 2016 11
§ Increased investment in information security
tools have provided additional layers of defense
to reduce risk
§ Building security into project design and
ensuring safe integration is key to protect data
and infrastructure
§ Investment in enterprise solutions to provide
additional alerting, reporting and security
protection
13. City of Calgary - CCTV at a Glance
Oct 27, 2016 Cyber Summit 2016 13
Ø The City of Calgary through Corporate Security,
Calgary Transit, Roads and Calgary Parking Authority
has deployed approximately 3,000 cameras.
Ø Cameras are deployed based on what’s required to
ensure the safety and security of the public,
employees, information, sites and assets.
Ø Regular risk assessments and security audits are
completed on all existing and new City of Calgary
facilities
14. Oct 27, 2016 Cyber Summit 2016 14
CS
Secure
Storage
Analytics
Calgary
Data
City Network Infrastructure
Corporate Security CCTV Network
DATA
EXCHANGE
RECORDED
VIDEO
City
Business
Units
LIVE
VIDEO
DATA
EXCHANGE
15. Camera’s as a Sensor
Oct 27, 2016 Cyber Summit 2016 15
§ Cameras are primarily used by The City as
a sensor. They collect video images and
meta data which can be used to enhance
the ability of the recipient to provide
effective assessment and response.
§ The use of a single or limited number of
devices to capture varying data streams
useful to more than one user
§ Sensors as a Service and Common Mode Cameras together allow for
ability to tie in additional data capture points.
16. Freedom of Information
Oct 27, 2016 Cyber Summit 2016 16
Ø “Personal Information” is defined in section 1(n) of the FOIP Act as
recorded information about an identifiable individual, including: the
individual’s race, colour, national or ethnic origin; the individual’s age or
sex; the individual’s inheritable characteristics; information about an
individual’s physical or mental disability; and any other identifiable
characteristics listed in that section.
Ø “Surveillance System” refers to a mechanical or electronic system or
device that enables continuous or periodic video recording, observing or
monitoring of personal information about individuals in open, public
spaces (including streets, highways, parks), public buildings (including
provincial and local government buildings, libraries, health care facilities,
public housing and educational institutions) or public transportation,
including school and municipal transit buses or other similar vehicles.
17. § Authority to use CCTV is granted under
S. 33 of the Freedom of Information and
Protection of Privacy Act
§ Careful consideration is always given to
balance both the privacy of individuals
and ensure personal and public safety
§ Corporate Security continue to meet the
requirements for collecting video under
the Freedom of Information & Protection
of Privacy Act. This includes, providing
a business case for gathering video,
alerting citizens that they are being
recorded and protecting the video.
Oct 27, 2016 Cyber Summit 2016 17
Authority to Collect
18. Monitoring
Oct 27, 2016 Cyber Summit 2016 18
§ Corporate Security utilizes an
enterprise video management system
to monitor cameras from its Integrated
Security Centre.
§ System provides efficiencies and
effectiveness in monitoring and
response.
§ Reduces the number of ad-hoc
standalone systems that require
manual and onsite review.
§ In order to remotely monitor cameras via the network, streaming is
performed at a lower frame rate and definition than what is recorded at
the edge level.
19. Security of Data
Oct 27, 2016 Cyber Summit 2016 19
§ City of Calgary Corporate Security
employees are the only persons to have
administrative rights to the DVRs and
NVRs and are responsible for providing
DVDs (read only media and watermarked)
to the Law Department or Calgary Police
Service as directed.
§ Information is stored at the location of the
NVR and is under lock and key.
§ Information is only collected if movement
is detected within the area (incident
based).
§ Audit Logs
20. Storage and Retention of Video
Oct 27, 2016 Cyber Summit 2016 20
§ Data retention policies are crucial for managing the increase in storage
cost/ Requirements.
§ City retention policy for all video is 14 days or 31 days
§ Storage surplus required for proper function and allowance for
“protecting” video for investigative purposes (25% or more is ideal).
§ Most City of Calgary sites use distributed, edge level recording
1. Bandwidth – The required bandwidth for recording high quality imagery either
exceeds the limitations of the network in remote locations or seriously affects quality
of service for users at the remote site.
2. Autonomy– In the event of failure of the network, edge level recorders continue to
record.
21. Oct 27, 2016 Cyber Summit 2016 21
Calgary Recreation (Facility Security)
Roads Department
(Traffic Monitoring)
Calgary Parking Authority (parking usage)
Calgary Transit
(BRT, bus performance)
Calgary Police Service
(LPR, incident investigation)
Water
(flood, water level monitoring)
Internal Clients External Clients
Roads Department
(Traffic Monitoring)
University of Calgary
(Utilizes traffic data for research projects)
22. Data aggregation and correlation
Oct 27, 2016 Cyber Summit 2016 22
Sensor
Data
• Water Sensors
• CCTV
• Traffic sensors
• Access control
• Public/ smart lighting
• WiFi
• Geolocation data
• Traffic control/
intersection camera
feeds
Service
Based Data
• Transactional Data
(PoS)
• Registration/ facility
use
• Land use
• Tax Information
• Permit and
Development
• Parking
23. Striking the Balance
11/1/16 Presentation 23
Openness Protection
Secure personal
and critical data
Large public facing
presence
Must Remain
Operational
Accessible
Information
Routine Disclosure
Obligations
Open Data
Initiatives