SlideShare a Scribd company logo
Disaster Risk Management in the Information Age ICT, Disaster Risk Assessment, Mitigation, and Reduction   Transforming the Business of Public Safety & Security Andrew S. Levy IBM Corporate Service Corps Fellow [email_address]
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Sahana Disaster Management System
Mitigation and Reduction Requires Training and Exercise
With Focus on Cultural Awareness, Environment and Change
ICT Can Be Core To The Solution, But Creates Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Translating out-dated technology into business value Solutions Include Instant Collaboration and Web 2.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Wireless Infrastructure System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technology can provide critical information  far beyond traditional monitoring  for a wide range of practical usage, with  flexibility and control .  ,[object Object],[object Object],[object Object],[object Object],[object Object],Effective Decisions    to Reach Virtually Anywhere    to Work Smarter Tools that Matter
Dynamic, Living Plans ,[object Object],[object Object],[object Object],Multi-Agency Coordination
Key Challenge - Information is Scattered Law Enforcement Data Exchanges Criminal Justice,  Corrections Agencies Regional Centers of Operations Federal, Regional, Homeland Security Fire Dept,  Early Responders,  Other Disciplines Information Requirements
Enabling the Possibilities We must collect, integrate, and analyze the scattered pieces of data and information required to assemble the big picture
Modeling and Simulation Deep Thunder  – Forecasts for  Weather-Sensitive Operations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Networked Video - Wide Range of  potential  placements of Networked Video for Public Safety Streets, Roadways, Public Spaces Schools Effective Information Command Buses Public Safety Vehicles Personnel
IBM developed innovative camera enclosures and installations ,[object Object],[object Object],[object Object],[object Object],[object Object]
“ Who is Who?” Recognizes the single identity who is made up of multiple records Mr. Joseph Carbella 55 Church Street New York, NY 10007 Tel#: 212-693-5312 DOB: 07/08/66 SID#: 068588345 DL#: 544 210 836 Mr. Joe Jones APT 4909 Bethesda, MD 20814 Tel#:  978-365-6631 DOB:  09/07/66 Mr. Joe Carbello 1 Bourne St Clinton MA 01510 TEL#: 978-365 - 6631 DL#:  544 210 836 DOB: 07/09/66 Mr. Joey Carbello 555 Church Ave New York, NY 10070 Tel#:  212-693-5312   DL#:  544 210 836 PPN#: 086588345 Close match Exact match
Single Sign On Role Based Personalization Customization Navigation Security Integration on the Glass Operations  Planning Incident Management Mapping People Finder Live Feeds Collaboration
Overview Overview Live chat See cameras on map Situational Awareness  and Collaboration Real-time video with captions Awareness Live video feeds
Service Discovery Services Enterprise Service Management Services SOA Foundation – Accelerator Common Enterprise Services Enabled by IBM SOA Planning &  Preparedness  Services (Virtual Agility Corp) Incident Management Services (NC4 Corp) Decision Support Services (ThoughtWeb Corp) School  Planning Services (SafePlans  Corp) 3D Digital Building Services (Archaio Corp) ISV Services Geo Spatial & Situational  Awareness  Services (ESRI Corp) Radio Connect Services (KITS Corp) Network Services (CISCO Corp) Mass Alert Notification Services (Amatra Corp) Radio & System Technologies (Motorola Corp) Service Service Service Service Service Service Service Messaging Services Service Mediation Services Service Collaboration Services (Video Conf,  Chat,  Whiteboard etc.) Service Security Services (Secure Access, TIM, TAM, Single Sign On,  DataPower) Service Service Service Service Service Service Enterprise Service Bus
Case Study: Child Abduction With Crime Information Warehouse 4 year old male abducted while he was with a babysitter and his mother was at work. The former babysitter came by and took the child claiming she had permission from the mother.  Without Crime Information Warehouse Full Court Press:  Police establish a task force and initiate investigative canvasses … the hours pass Prior to initiating a full court press the squad detective calls for assistance. The suspects id is entered in the system, which produces 7 names, 7 addresses, 3 DOB’s, & 6 SS numbers.  Investigators easily find common denominator and locate the child and the suspect.
Connecting the Dots on 9 Holdups in 4 Boroughs  - New York Times; November 12, 2006 9 robbery incidents across 4 boroughs …hold ups miles apart … a clever strategy 3 robbers; rental car,  2 chrome plated handguns, Always a mapped escape route … Faces covered with stockings and masks. Citywide patterns across boroughs were hard to detect. “We’ve had incidents where it’s taken time, more time, to identify a citywide pattern,” said Police Commissioner Raymond W. Kelly. The Last Robbery:  The men fled the CVS, an employee called 911,and an alert was sent out across the police radio.  Teams of detectives were waiting for them.  The robbers got tangled in their predictable pattern. “ They charged us with all those robberies, but they caught us with one,” Mr. Belcon said.
“… Comprehensive, highly relevant, instantaneous information… transforming the way we solve crimes…” “… Shorty…” (a nickname) Recent Summons Known Addresses  Relationships of Interest Parolees In Vicinity Suspect 1 Positive ID Suspect 2 Positive ID Arrests & Linkage to Crimes in Other Precincts Previous  Arrests Information in context, in the hands of detectives, at the scene… (a tatoo)
Operation Golden Guardian 2007 (ARNORTH & State of California EMA) Benefits ,[object Object],[object Object],[object Object],[object Object],Achieve interoperability and synchronization between 45 public agencies to include the US Army (ARNORTH) and the California State and Local Emergency Response Agencies and Command Centers.  ,[object Object],[object Object],[object Object],Project Overview Disaster Preparedness Challenge ,[object Object],[object Object],[object Object],Both ARNORTH and California participating agencies wanted a common operating picture that showed a fused common operating picture across agency lines so that agencies could see the big picture - :On one sheet of music”.  ,[object Object],[object Object],[object Object],[object Object]
Gauteng Disaster Management Center GERIS Gauteng Emergency Information Resource Services Benefits ,[object Object],[object Object],[object Object],[object Object],The Gauteng Province is exposed to an array of hazards that can threaten livelihoods and damage critical infrastructures. The Province will also be hosting the 2010 FIFA World Cup Games. ,[object Object],[object Object],[object Object],Project Overview Business Challenge South Africa ,[object Object],[object Object],[object Object],The local government needed a real time Common Operating Picture and interoperability for its command center and officers in the field to prepare for emergencies and support emergency operations ,[object Object],[object Object],[object Object],[object Object]
State of Missouri MERIS Missouri Emergency Resource Information System Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Project Overview Business Challenge United States ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Best Practices and Lessons Learned ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Additional Information citizencorps.blogspot.com www-03.ibm.com/industries/government/doc/jsp/indseg/all/f/index.jsp?re=gihome67gov Andrew S. Levy IBM Corporate Service Corps Fellow [email_address] Reaching over  13,000  people in over  1,400  cities in over  75  countries in 12 months.

More Related Content

What's hot

Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
Don Grauel
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
NTT Innovation Institute Inc.
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
Cisco Service Provider Mobility
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
CODE BLUE
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
CBIZ, Inc.
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodmanjonneiditz
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
Benjamin Ang
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
Olivier Busolini
 
Security economics
Security economicsSecurity economics
Security economics
Yansi Keim
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
CMR WORLD TECH
 
Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021
Shawn Nutley
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
ReadWrite
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology Summit
Carahsoft
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
ecarrow
 
Revolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryRevolution Or Evolution Exec Summary
Revolution Or Evolution Exec Summary
William Beer
 
AGILIS: an on-line map reduce environment for collaborative security
AGILIS: an on-line map reduce environment for collaborative securityAGILIS: an on-line map reduce environment for collaborative security
AGILIS: an on-line map reduce environment for collaborative securityRoberto Baldoni
 

What's hot (20)

Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
 
Technology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the LawTechnology Disruption in the New Normal, Digital Inclusion and the Law
Technology Disruption in the New Normal, Digital Inclusion and the Law
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
Security economics
Security economicsSecurity economics
Security economics
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology Summit
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
Revolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryRevolution Or Evolution Exec Summary
Revolution Or Evolution Exec Summary
 
AGILIS: an on-line map reduce environment for collaborative security
AGILIS: an on-line map reduce environment for collaborative securityAGILIS: an on-line map reduce environment for collaborative security
AGILIS: an on-line map reduce environment for collaborative security
 

Viewers also liked

Archief20 Okt 2008 Int 2
Archief20 Okt 2008 Int 2Archief20 Okt 2008 Int 2
Archief20 Okt 2008 Int 2
Stichting Mommerskwartier
 
Malpot bisesh-byebastha
Malpot bisesh-byebasthaMalpot bisesh-byebastha
Malpot bisesh-byebasthaDPNet
 
Progressing the Concept of Resilience in Risk Reduction and Disaster Management
Progressing the Concept of Resilience in Risk Reduction and Disaster ManagementProgressing the Concept of Resilience in Risk Reduction and Disaster Management
Progressing the Concept of Resilience in Risk Reduction and Disaster Management
Global Risk Forum GRFDavos
 
Lecture 6: Urban & Regional Planning (Risk Mitigation Concept)
Lecture 6: Urban & Regional Planning (Risk Mitigation Concept)Lecture 6: Urban & Regional Planning (Risk Mitigation Concept)
Lecture 6: Urban & Regional Planning (Risk Mitigation Concept)
Bayes Ahmed
 
RA 10121 Implementing Rules and Regulations
RA 10121 Implementing Rules and RegulationsRA 10121 Implementing Rules and Regulations
RA 10121 Implementing Rules and Regulations
Tudlo
 
Opening Statement: Disaster Risk Reduction and Management and the Roles of In...
Opening Statement: Disaster Risk Reduction and Management and the Roles of In...Opening Statement: Disaster Risk Reduction and Management and the Roles of In...
Opening Statement: Disaster Risk Reduction and Management and the Roles of In...
Senator Loren Legarda
 
Drr planning at natinal & district level.(mo ld)
Drr planning at natinal & district level.(mo ld)Drr planning at natinal & district level.(mo ld)
Drr planning at natinal & district level.(mo ld)
DPNet
 
Proposed Local Disaster Risk Reduction Management Planning Process
Proposed Local Disaster Risk Reduction Management Planning ProcessProposed Local Disaster Risk Reduction Management Planning Process
Proposed Local Disaster Risk Reduction Management Planning Process
Leo Guinid
 
Rapid response team
Rapid response teamRapid response team
Rapid response team
Shailendra Veerarajapura
 
Ninil Jannah Lingkar Association: Disaster Risk Mitigation and Prevention for...
Ninil Jannah Lingkar Association: Disaster Risk Mitigation and Prevention for...Ninil Jannah Lingkar Association: Disaster Risk Mitigation and Prevention for...
Ninil Jannah Lingkar Association: Disaster Risk Mitigation and Prevention for...
Lingkar Association (Perkumpulan Lingkar)
 
Climate change powerpoint
Climate change powerpointClimate change powerpoint
Climate change powerpointpacorz
 

Viewers also liked (13)

Archief20 Okt 2008 Int 2
Archief20 Okt 2008 Int 2Archief20 Okt 2008 Int 2
Archief20 Okt 2008 Int 2
 
Malpot bisesh-byebastha
Malpot bisesh-byebasthaMalpot bisesh-byebastha
Malpot bisesh-byebastha
 
Progressing the Concept of Resilience in Risk Reduction and Disaster Management
Progressing the Concept of Resilience in Risk Reduction and Disaster ManagementProgressing the Concept of Resilience in Risk Reduction and Disaster Management
Progressing the Concept of Resilience in Risk Reduction and Disaster Management
 
Disaster risk reduction
Disaster risk reductionDisaster risk reduction
Disaster risk reduction
 
Lecture 6: Urban & Regional Planning (Risk Mitigation Concept)
Lecture 6: Urban & Regional Planning (Risk Mitigation Concept)Lecture 6: Urban & Regional Planning (Risk Mitigation Concept)
Lecture 6: Urban & Regional Planning (Risk Mitigation Concept)
 
RA 10121 Implementing Rules and Regulations
RA 10121 Implementing Rules and RegulationsRA 10121 Implementing Rules and Regulations
RA 10121 Implementing Rules and Regulations
 
Opening Statement: Disaster Risk Reduction and Management and the Roles of In...
Opening Statement: Disaster Risk Reduction and Management and the Roles of In...Opening Statement: Disaster Risk Reduction and Management and the Roles of In...
Opening Statement: Disaster Risk Reduction and Management and the Roles of In...
 
Drr planning at natinal & district level.(mo ld)
Drr planning at natinal & district level.(mo ld)Drr planning at natinal & district level.(mo ld)
Drr planning at natinal & district level.(mo ld)
 
Proposed Local Disaster Risk Reduction Management Planning Process
Proposed Local Disaster Risk Reduction Management Planning ProcessProposed Local Disaster Risk Reduction Management Planning Process
Proposed Local Disaster Risk Reduction Management Planning Process
 
Rapid response team
Rapid response teamRapid response team
Rapid response team
 
Ninil Jannah Lingkar Association: Disaster Risk Mitigation and Prevention for...
Ninil Jannah Lingkar Association: Disaster Risk Mitigation and Prevention for...Ninil Jannah Lingkar Association: Disaster Risk Mitigation and Prevention for...
Ninil Jannah Lingkar Association: Disaster Risk Mitigation and Prevention for...
 
Causes and effects of climate change
Causes and effects of climate changeCauses and effects of climate change
Causes and effects of climate change
 
Climate change powerpoint
Climate change powerpointClimate change powerpoint
Climate change powerpoint
 

Similar to Disaster Risk Management in the Information Age

SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
Stephen Bates
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
Shreyas Satpute
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
GAURAV. H .TANDON
 
Get The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsGet The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation Tools
Paraben Corporation
 
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
Grid Dynamics
 
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA (European Emergency Number Association)
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
Mestizo Enterprises
 
Next gen emergency-aware platform
Next gen emergency-aware platformNext gen emergency-aware platform
Next gen emergency-aware platform
Prodapt Solutions
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
Andris Soroka
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence Platform
Haystax Technology
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Dr Rachel O'Connell
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
The Security of Things Forum
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
Internet of Things for Next-Generation Public Safety Mobile Communications
Internet of Things for Next-Generation Public Safety Mobile CommunicationsInternet of Things for Next-Generation Public Safety Mobile Communications
Internet of Things for Next-Generation Public Safety Mobile Communications
Reza Nourjou, Ph.D.
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
marukanda
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
Renub Research
 

Similar to Disaster Risk Management in the Information Age (20)

SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
Get The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsGet The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation Tools
 
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
 
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
Next gen emergency-aware platform
Next gen emergency-aware platformNext gen emergency-aware platform
Next gen emergency-aware platform
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence Platform
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
SIA-Q1-2016
SIA-Q1-2016SIA-Q1-2016
SIA-Q1-2016
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Internet of Things for Next-Generation Public Safety Mobile Communications
Internet of Things for Next-Generation Public Safety Mobile CommunicationsInternet of Things for Next-Generation Public Safety Mobile Communications
Internet of Things for Next-Generation Public Safety Mobile Communications
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 

More from global

ISCRAM ASIA 2012
ISCRAM ASIA 2012ISCRAM ASIA 2012
ISCRAM ASIA 2012
global
 
Seminar IM 2010 SeminarIM
Seminar IM 2010 SeminarIMSeminar IM 2010 SeminarIM
Seminar IM 2010 SeminarIM
global
 
Jaap van de Herik dinnertalk at ISCRAM Summer School 25 Augustus
Jaap van de Herik dinnertalk at ISCRAM Summer School 25 AugustusJaap van de Herik dinnertalk at ISCRAM Summer School 25 Augustus
Jaap van de Herik dinnertalk at ISCRAM Summer School 25 Augustusglobal
 
Patrick Gordon ISCRAM2009 Summer School One Response Presentation
Patrick Gordon ISCRAM2009 Summer School One Response PresentationPatrick Gordon ISCRAM2009 Summer School One Response Presentation
Patrick Gordon ISCRAM2009 Summer School One Response Presentation
global
 
2009 ISCRAM Summer School Program Book 08082009
2009 ISCRAM Summer School Program Book 080820092009 ISCRAM Summer School Program Book 08082009
2009 ISCRAM Summer School Program Book 08082009
global
 
Gi4 Dm Opening 2008
Gi4 Dm Opening 2008Gi4 Dm Opening 2008
Gi4 Dm Opening 2008global
 
Community based vulnerability assessment
Community based vulnerability assessmentCommunity based vulnerability assessment
Community based vulnerability assessment
global
 
Natural Disasters and Complex Emergencies: Geo-Referencing their Human Impacts
Natural Disasters and Complex Emergencies: Geo-Referencing their Human ImpactsNatural Disasters and Complex Emergencies: Geo-Referencing their Human Impacts
Natural Disasters and Complex Emergencies: Geo-Referencing their Human Impacts
global
 
Globalisation of healthcare by virtualisation of hospitals
Globalisation of healthcare by virtualisation of hospitalsGlobalisation of healthcare by virtualisation of hospitals
Globalisation of healthcare by virtualisation of hospitals
global
 
GIS platforms: the power of interoperability
GIS platforms: the power of interoperabilityGIS platforms: the power of interoperability
GIS platforms: the power of interoperability
global
 
Birkmann Unu Ehs Spider Bonn Ws 2008
Birkmann Unu Ehs Spider Bonn Ws 2008Birkmann Unu Ehs Spider Bonn Ws 2008
Birkmann Unu Ehs Spider Bonn Ws 2008
global
 
Spatial ICTs for risk identification and risk reduction: Three geographic sca...
Spatial ICTs for risk identification and risk reduction:Three geographic sca...Spatial ICTs for risk identification and risk reduction:Three geographic sca...
Spatial ICTs for risk identification and risk reduction: Three geographic sca...
global
 
Use of DAB Satellite for Addressable Alert Delivery
Use of DAB Satellite for Addressable Alert DeliveryUse of DAB Satellite for Addressable Alert Delivery
Use of DAB Satellite for Addressable Alert Delivery
global
 
Information Systems for Disaster Risk Management in LAC
Information Systems for Disaster Risk Management in LACInformation Systems for Disaster Risk Management in LAC
Information Systems for Disaster Risk Management in LAC
global
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
global
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
global
 
UN OCHA presentation
UN OCHA presentationUN OCHA presentation
UN OCHA presentation
global
 
Disaster Management: role of ICTs
Disaster Management: role of ICTsDisaster Management: role of ICTs
Disaster Management: role of ICTs
global
 
Design of Emergency Response Management Information Systems
Design of Emergency Response Management Information SystemsDesign of Emergency Response Management Information Systems
Design of Emergency Response Management Information Systems
global
 
ISCRAM-CHINA2008 keynote presentation Renato Iannella
ISCRAM-CHINA2008 keynote presentation Renato IannellaISCRAM-CHINA2008 keynote presentation Renato Iannella
ISCRAM-CHINA2008 keynote presentation Renato Iannella
global
 

More from global (20)

ISCRAM ASIA 2012
ISCRAM ASIA 2012ISCRAM ASIA 2012
ISCRAM ASIA 2012
 
Seminar IM 2010 SeminarIM
Seminar IM 2010 SeminarIMSeminar IM 2010 SeminarIM
Seminar IM 2010 SeminarIM
 
Jaap van de Herik dinnertalk at ISCRAM Summer School 25 Augustus
Jaap van de Herik dinnertalk at ISCRAM Summer School 25 AugustusJaap van de Herik dinnertalk at ISCRAM Summer School 25 Augustus
Jaap van de Herik dinnertalk at ISCRAM Summer School 25 Augustus
 
Patrick Gordon ISCRAM2009 Summer School One Response Presentation
Patrick Gordon ISCRAM2009 Summer School One Response PresentationPatrick Gordon ISCRAM2009 Summer School One Response Presentation
Patrick Gordon ISCRAM2009 Summer School One Response Presentation
 
2009 ISCRAM Summer School Program Book 08082009
2009 ISCRAM Summer School Program Book 080820092009 ISCRAM Summer School Program Book 08082009
2009 ISCRAM Summer School Program Book 08082009
 
Gi4 Dm Opening 2008
Gi4 Dm Opening 2008Gi4 Dm Opening 2008
Gi4 Dm Opening 2008
 
Community based vulnerability assessment
Community based vulnerability assessmentCommunity based vulnerability assessment
Community based vulnerability assessment
 
Natural Disasters and Complex Emergencies: Geo-Referencing their Human Impacts
Natural Disasters and Complex Emergencies: Geo-Referencing their Human ImpactsNatural Disasters and Complex Emergencies: Geo-Referencing their Human Impacts
Natural Disasters and Complex Emergencies: Geo-Referencing their Human Impacts
 
Globalisation of healthcare by virtualisation of hospitals
Globalisation of healthcare by virtualisation of hospitalsGlobalisation of healthcare by virtualisation of hospitals
Globalisation of healthcare by virtualisation of hospitals
 
GIS platforms: the power of interoperability
GIS platforms: the power of interoperabilityGIS platforms: the power of interoperability
GIS platforms: the power of interoperability
 
Birkmann Unu Ehs Spider Bonn Ws 2008
Birkmann Unu Ehs Spider Bonn Ws 2008Birkmann Unu Ehs Spider Bonn Ws 2008
Birkmann Unu Ehs Spider Bonn Ws 2008
 
Spatial ICTs for risk identification and risk reduction: Three geographic sca...
Spatial ICTs for risk identification and risk reduction:Three geographic sca...Spatial ICTs for risk identification and risk reduction:Three geographic sca...
Spatial ICTs for risk identification and risk reduction: Three geographic sca...
 
Use of DAB Satellite for Addressable Alert Delivery
Use of DAB Satellite for Addressable Alert DeliveryUse of DAB Satellite for Addressable Alert Delivery
Use of DAB Satellite for Addressable Alert Delivery
 
Information Systems for Disaster Risk Management in LAC
Information Systems for Disaster Risk Management in LACInformation Systems for Disaster Risk Management in LAC
Information Systems for Disaster Risk Management in LAC
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 
UN OCHA presentation
UN OCHA presentationUN OCHA presentation
UN OCHA presentation
 
Disaster Management: role of ICTs
Disaster Management: role of ICTsDisaster Management: role of ICTs
Disaster Management: role of ICTs
 
Design of Emergency Response Management Information Systems
Design of Emergency Response Management Information SystemsDesign of Emergency Response Management Information Systems
Design of Emergency Response Management Information Systems
 
ISCRAM-CHINA2008 keynote presentation Renato Iannella
ISCRAM-CHINA2008 keynote presentation Renato IannellaISCRAM-CHINA2008 keynote presentation Renato Iannella
ISCRAM-CHINA2008 keynote presentation Renato Iannella
 

Recently uploaded

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Disaster Risk Management in the Information Age

  • 1. Disaster Risk Management in the Information Age ICT, Disaster Risk Assessment, Mitigation, and Reduction Transforming the Business of Public Safety & Security Andrew S. Levy IBM Corporate Service Corps Fellow [email_address]
  • 2.
  • 3.
  • 4.
  • 5. Mitigation and Reduction Requires Training and Exercise
  • 6. With Focus on Cultural Awareness, Environment and Change
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Key Challenge - Information is Scattered Law Enforcement Data Exchanges Criminal Justice, Corrections Agencies Regional Centers of Operations Federal, Regional, Homeland Security Fire Dept, Early Responders, Other Disciplines Information Requirements
  • 13. Enabling the Possibilities We must collect, integrate, and analyze the scattered pieces of data and information required to assemble the big picture
  • 14.
  • 15. Networked Video - Wide Range of potential placements of Networked Video for Public Safety Streets, Roadways, Public Spaces Schools Effective Information Command Buses Public Safety Vehicles Personnel
  • 16.
  • 17. “ Who is Who?” Recognizes the single identity who is made up of multiple records Mr. Joseph Carbella 55 Church Street New York, NY 10007 Tel#: 212-693-5312 DOB: 07/08/66 SID#: 068588345 DL#: 544 210 836 Mr. Joe Jones APT 4909 Bethesda, MD 20814 Tel#: 978-365-6631 DOB: 09/07/66 Mr. Joe Carbello 1 Bourne St Clinton MA 01510 TEL#: 978-365 - 6631 DL#: 544 210 836 DOB: 07/09/66 Mr. Joey Carbello 555 Church Ave New York, NY 10070 Tel#: 212-693-5312 DL#: 544 210 836 PPN#: 086588345 Close match Exact match
  • 18. Single Sign On Role Based Personalization Customization Navigation Security Integration on the Glass Operations Planning Incident Management Mapping People Finder Live Feeds Collaboration
  • 19. Overview Overview Live chat See cameras on map Situational Awareness and Collaboration Real-time video with captions Awareness Live video feeds
  • 20. Service Discovery Services Enterprise Service Management Services SOA Foundation – Accelerator Common Enterprise Services Enabled by IBM SOA Planning & Preparedness Services (Virtual Agility Corp) Incident Management Services (NC4 Corp) Decision Support Services (ThoughtWeb Corp) School Planning Services (SafePlans Corp) 3D Digital Building Services (Archaio Corp) ISV Services Geo Spatial & Situational Awareness Services (ESRI Corp) Radio Connect Services (KITS Corp) Network Services (CISCO Corp) Mass Alert Notification Services (Amatra Corp) Radio & System Technologies (Motorola Corp) Service Service Service Service Service Service Service Messaging Services Service Mediation Services Service Collaboration Services (Video Conf, Chat, Whiteboard etc.) Service Security Services (Secure Access, TIM, TAM, Single Sign On, DataPower) Service Service Service Service Service Service Enterprise Service Bus
  • 21. Case Study: Child Abduction With Crime Information Warehouse 4 year old male abducted while he was with a babysitter and his mother was at work. The former babysitter came by and took the child claiming she had permission from the mother. Without Crime Information Warehouse Full Court Press: Police establish a task force and initiate investigative canvasses … the hours pass Prior to initiating a full court press the squad detective calls for assistance. The suspects id is entered in the system, which produces 7 names, 7 addresses, 3 DOB’s, & 6 SS numbers. Investigators easily find common denominator and locate the child and the suspect.
  • 22. Connecting the Dots on 9 Holdups in 4 Boroughs - New York Times; November 12, 2006 9 robbery incidents across 4 boroughs …hold ups miles apart … a clever strategy 3 robbers; rental car, 2 chrome plated handguns, Always a mapped escape route … Faces covered with stockings and masks. Citywide patterns across boroughs were hard to detect. “We’ve had incidents where it’s taken time, more time, to identify a citywide pattern,” said Police Commissioner Raymond W. Kelly. The Last Robbery: The men fled the CVS, an employee called 911,and an alert was sent out across the police radio. Teams of detectives were waiting for them. The robbers got tangled in their predictable pattern. “ They charged us with all those robberies, but they caught us with one,” Mr. Belcon said.
  • 23. “… Comprehensive, highly relevant, instantaneous information… transforming the way we solve crimes…” “… Shorty…” (a nickname) Recent Summons Known Addresses Relationships of Interest Parolees In Vicinity Suspect 1 Positive ID Suspect 2 Positive ID Arrests & Linkage to Crimes in Other Precincts Previous Arrests Information in context, in the hands of detectives, at the scene… (a tatoo)
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Additional Information citizencorps.blogspot.com www-03.ibm.com/industries/government/doc/jsp/indseg/all/f/index.jsp?re=gihome67gov Andrew S. Levy IBM Corporate Service Corps Fellow [email_address] Reaching over 13,000 people in over 1,400 cities in over 75 countries in 12 months.