SlideShare a Scribd company logo
1 of 1
Download to read offline
HOWARD COUNTY BRAC TASK FORCE
BRAC BIT: #59
DATE: 8 December 2009
SUBJECT(S): Event, Cyber Security Task Force, CYBER BITS
POINT OF CONTACT: Kent Menser (410-313-6521) kmenser@howardcountymd.gov

1.   Upcoming Event:
         a. BRAC Business Initiative In Progress Review (IPR) # 4
                   i. Date: 13 January, 8 AM to 10 AM
                  ii. Location: Other Barn, 5851 Robert Oliver Pl # 2
                      Columbia, MD 21045-3728 (410) 730-4610
                 iii. Agenda:
                                Major Defense Contractor Presentation
                                In Progress Review
                                Networking Between BBI Partners before and after the presentations
2.   Discussion:
         a. Help! Our BBI Team needs the services of a volunteer who has relevant experience and savvy in the
             Defense Contracting business. Time is negotiable, salary is not! Contact Kent if you have the interest.
         b. Cyber Security Task Force:
                   i. The Senate Select Committee on Intelligence announced today the formation of a bipartisan
                      task force on cyber security. Senator Barbara Mikulski (D-Md.) and Senator Olympia Snowe
                      (R-Maine) will serve as members of the task force, and Senator Sheldon Whitehouse (D-R.I.)
                      will serve as task force chair. The task force will evaluate cyber threats to the United States
                      and issue recommendations to the U.S. intelligence community as appropriate. The task force
                      will complete its work by June 2010.
                  ii. “Cyber security is a growing national security threat, and one I take very seriously,” Senator
                      Mikulski said. “As a member of this new Senate Cyber Security Task Force, I will be working
                      with my colleagues to provide guidance on how to better coordinate our defenses against the
                      complex and evolving attacks by hackers and cyber spies that our nation faces each day.
                      Cyber security has been of growing concern to me and my constituents since the devastating
                      cyber attacks against Estonia two years ago. I look forward to continuing to work on this
                      important issue.”
         c. BWI Business Partnership Meeting:
             At the Partnership meeting on 9 December, Senator Mikulski described how Team Maryland was
             working hard to bring Cyber Command to Maryland. She stated that if the subject command came to
             MD, it could bring up to 15,000 jobs, both federal and contractor. More will follow on this topic.
         d. Consequences of Fort Meade Growth:
                   i. Today, about 90% of Fort Meade workers drive to work, with an average commute of about
                      20 miles. Following this pattern, the 22,000 new jobs coming to Fort Meade will generate
                      serious traffic congestion in and around the installation. We will see increasing delays on
                      MD-32, MD-295, MD 198 and MD-175 beginning in mid-2010 and continuing through 2020.
                      Traffic diverting from this impact point will affect other nearby highways and intersections as
                      well.
                  ii. We knew early in the BRAC process that there would not be sufficient Federal / State
                      funding for the necessary highway improvements. Therefore, we are going to have to initally
                      think our way through this challenge. The “think vehicle” will be Transportation Demand
                      Management (TMD). Simply put, more people in fewer vehicles, through the use of busses,
                      van pools, car pools, telecommuting and more. The Fort Meade Regional Growth
                      Management Committee’s Transportation Committee is working this issue.
3.   CYBER BITS:
             ….”Allegations that China is behind, or likely behind, cyberattacks or cyber espionage against the
             United States are more frequent and more sensational, “said Wang Baodong, the spokesman at the
             Chinese Embassy in Washington. “Such accusations are unwarranted, irresponsible and misleading
             and intentionally fabricated to fan China threat sensations…….” Ellen Nakashima and John Pomfret,
             Washington Post, 11 November 2009

More Related Content

What's hot

Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
smita mitra
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
Eljay Robertson
 
Internet freedom in cambodia
Internet freedom in cambodiaInternet freedom in cambodia
Internet freedom in cambodia
Moses Ngeth
 

What's hot (15)

2018 april - aba legal construct for understanding adversarial cyber activit...
2018 april  - aba legal construct for understanding adversarial cyber activit...2018 april  - aba legal construct for understanding adversarial cyber activit...
2018 april - aba legal construct for understanding adversarial cyber activit...
 
Forecast and Outlook for big tech, privacy legislation, green tech and climat...
Forecast and Outlook for big tech, privacy legislation, green tech and climat...Forecast and Outlook for big tech, privacy legislation, green tech and climat...
Forecast and Outlook for big tech, privacy legislation, green tech and climat...
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
 
The US–China high-tech competition is modernizing American industries: an int...
The US–China high-tech competition is modernizing American industries: an int...The US–China high-tech competition is modernizing American industries: an int...
The US–China high-tech competition is modernizing American industries: an int...
 
Cyberspace and Digital Diplomacy
Cyberspace and Digital DiplomacyCyberspace and Digital Diplomacy
Cyberspace and Digital Diplomacy
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
Internet censorship power point
Internet censorship power pointInternet censorship power point
Internet censorship power point
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Internet freedom in cambodia
Internet freedom in cambodiaInternet freedom in cambodia
Internet freedom in cambodia
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 

Viewers also liked (17)

Historia del atletismo
Historia del atletismoHistoria del atletismo
Historia del atletismo
 
Atletismo
AtletismoAtletismo
Atletismo
 
Reglas de resistencia
Reglas de resistenciaReglas de resistencia
Reglas de resistencia
 
Historia y Evolucion del Atletismo
Historia y Evolucion del AtletismoHistoria y Evolucion del Atletismo
Historia y Evolucion del Atletismo
 
Fuerza gravitacional
Fuerza gravitacionalFuerza gravitacional
Fuerza gravitacional
 
Pista atlética
Pista atléticaPista atlética
Pista atlética
 
Presentación atletismo
Presentación atletismoPresentación atletismo
Presentación atletismo
 
Atletismo: Pruebas de Resistencia
Atletismo: Pruebas de ResistenciaAtletismo: Pruebas de Resistencia
Atletismo: Pruebas de Resistencia
 
Trabajo Ed. Física
Trabajo Ed. FísicaTrabajo Ed. Física
Trabajo Ed. Física
 
El atletismo
El atletismoEl atletismo
El atletismo
 
PRUEBAS DEL ATLETISMO
PRUEBAS DEL ATLETISMOPRUEBAS DEL ATLETISMO
PRUEBAS DEL ATLETISMO
 
Fuerza gravitacional
Fuerza gravitacionalFuerza gravitacional
Fuerza gravitacional
 
Diapositivas de ATLETISMO
Diapositivas de ATLETISMODiapositivas de ATLETISMO
Diapositivas de ATLETISMO
 
Atletismo
Atletismo Atletismo
Atletismo
 
Presentacion Ppt Atletismo
Presentacion Ppt AtletismoPresentacion Ppt Atletismo
Presentacion Ppt Atletismo
 
Clasificación de las pruebas (Pista, campo y combinadas)
Clasificación de las pruebas (Pista, campo y combinadas)Clasificación de las pruebas (Pista, campo y combinadas)
Clasificación de las pruebas (Pista, campo y combinadas)
 
Atletismo
AtletismoAtletismo
Atletismo
 

Similar to Howard County Brac Bit # 59

Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Ben Griffith
 
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
amrit47
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
TopCyberNewsMAGAZINE
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
Scott Dickson
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
Lucy Kitchin
 

Similar to Howard County Brac Bit # 59 (20)

TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber SpeedCrowdsourcing Expert Performance to Improve Training at Cyber Speed
Crowdsourcing Expert Performance to Improve Training at Cyber Speed
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Cyber In-Security II: Closing the Federal Gap
Cyber In-Security II: Closing the Federal GapCyber In-Security II: Closing the Federal Gap
Cyber In-Security II: Closing the Federal Gap
 
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Presenting and persuading with data
Presenting and persuading with dataPresenting and persuading with data
Presenting and persuading with data
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
DHS Leaks.pdf
DHS Leaks.pdfDHS Leaks.pdf
DHS Leaks.pdf
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdfTop Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
Top Cyber News MAGAZINE February 2022 Chuck D Brooks. Highest Resolution.pdf
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
 
Beyond Brac 2011
Beyond Brac 2011Beyond Brac 2011
Beyond Brac 2011
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
The Strategic Importance of Building a Resilient Cyber Defense.pdf
The Strategic Importance of Building a Resilient Cyber Defense.pdfThe Strategic Importance of Building a Resilient Cyber Defense.pdf
The Strategic Importance of Building a Resilient Cyber Defense.pdf
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 

Recently uploaded

Sonia Journal club presentation (2).pptx
Sonia Journal club presentation (2).pptxSonia Journal club presentation (2).pptx
Sonia Journal club presentation (2).pptx
palsonia139
 
Cardiac Impulse: Rhythmical Excitation and Conduction in the Heart
Cardiac Impulse: Rhythmical Excitation and Conduction in the HeartCardiac Impulse: Rhythmical Excitation and Conduction in the Heart
Cardiac Impulse: Rhythmical Excitation and Conduction in the Heart
MedicoseAcademics
 

Recently uploaded (20)

DR. Neha Mehta Best Psychologist.in India
DR. Neha Mehta Best Psychologist.in IndiaDR. Neha Mehta Best Psychologist.in India
DR. Neha Mehta Best Psychologist.in India
 
Sonia Journal club presentation (2).pptx
Sonia Journal club presentation (2).pptxSonia Journal club presentation (2).pptx
Sonia Journal club presentation (2).pptx
 
Is Rheumatoid Arthritis a Metabolic Disorder.pptx
Is Rheumatoid Arthritis a Metabolic Disorder.pptxIs Rheumatoid Arthritis a Metabolic Disorder.pptx
Is Rheumatoid Arthritis a Metabolic Disorder.pptx
 
Case presentation on Antibody screening- how to solve 3 cell and 11 cell panel?
Case presentation on Antibody screening- how to solve 3 cell and 11 cell panel?Case presentation on Antibody screening- how to solve 3 cell and 11 cell panel?
Case presentation on Antibody screening- how to solve 3 cell and 11 cell panel?
 
HyperIgE syndrome: primary immune deficiency.pdf
HyperIgE syndrome: primary immune deficiency.pdfHyperIgE syndrome: primary immune deficiency.pdf
HyperIgE syndrome: primary immune deficiency.pdf
 
Video capsule endoscopy (VCE ) in children
Video capsule endoscopy (VCE ) in childrenVideo capsule endoscopy (VCE ) in children
Video capsule endoscopy (VCE ) in children
 
In-service education (Nursing Mangement)
In-service education (Nursing Mangement)In-service education (Nursing Mangement)
In-service education (Nursing Mangement)
 
Vaccines: A Powerful and Cost-Effective Tool Protecting Americans Against Dis...
Vaccines: A Powerful and Cost-Effective Tool Protecting Americans Against Dis...Vaccines: A Powerful and Cost-Effective Tool Protecting Americans Against Dis...
Vaccines: A Powerful and Cost-Effective Tool Protecting Americans Against Dis...
 
Cardiac Impulse: Rhythmical Excitation and Conduction in the Heart
Cardiac Impulse: Rhythmical Excitation and Conduction in the HeartCardiac Impulse: Rhythmical Excitation and Conduction in the Heart
Cardiac Impulse: Rhythmical Excitation and Conduction in the Heart
 
CT scan of penetrating abdominopelvic trauma
CT scan of penetrating abdominopelvic traumaCT scan of penetrating abdominopelvic trauma
CT scan of penetrating abdominopelvic trauma
 
TEST BANK For Lewis's Medical Surgical Nursing in Canada, 4th Edition by Jane...
TEST BANK For Lewis's Medical Surgical Nursing in Canada, 4th Edition by Jane...TEST BANK For Lewis's Medical Surgical Nursing in Canada, 4th Edition by Jane...
TEST BANK For Lewis's Medical Surgical Nursing in Canada, 4th Edition by Jane...
 
Muscle Energy Technique (MET) with variant and techniques.
Muscle Energy Technique (MET) with variant and techniques.Muscle Energy Technique (MET) with variant and techniques.
Muscle Energy Technique (MET) with variant and techniques.
 
World Hypertension Day 17th may 2024 ppt
World Hypertension Day 17th may 2024 pptWorld Hypertension Day 17th may 2024 ppt
World Hypertension Day 17th may 2024 ppt
 
TEST BANK for The Nursing Assistant Acute, Subacute, and Long-Term Care, 6th ...
TEST BANK for The Nursing Assistant Acute, Subacute, and Long-Term Care, 6th ...TEST BANK for The Nursing Assistant Acute, Subacute, and Long-Term Care, 6th ...
TEST BANK for The Nursing Assistant Acute, Subacute, and Long-Term Care, 6th ...
 
ROSE CASE SPINAL SBRT BY DR KANHU CHARAN PATRO
ROSE  CASE SPINAL SBRT BY DR KANHU CHARAN PATROROSE  CASE SPINAL SBRT BY DR KANHU CHARAN PATRO
ROSE CASE SPINAL SBRT BY DR KANHU CHARAN PATRO
 
Renal Replacement Therapy in Acute Kidney Injury -time modality -Dr Ayman Se...
Renal Replacement Therapy in Acute Kidney Injury -time  modality -Dr Ayman Se...Renal Replacement Therapy in Acute Kidney Injury -time  modality -Dr Ayman Se...
Renal Replacement Therapy in Acute Kidney Injury -time modality -Dr Ayman Se...
 
Gallbladder Double-Diverticular: A Case Report المرارة مزدوجة التج: تقرير حالة
Gallbladder Double-Diverticular: A Case Report  المرارة مزدوجة التج: تقرير حالةGallbladder Double-Diverticular: A Case Report  المرارة مزدوجة التج: تقرير حالة
Gallbladder Double-Diverticular: A Case Report المرارة مزدوجة التج: تقرير حالة
 
Hemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.Gawad
Hemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.GawadHemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.Gawad
Hemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.Gawad
 
Cervical screening – taking care of your health flipchart (Vietnamese)
Cervical screening – taking care of your health flipchart (Vietnamese)Cervical screening – taking care of your health flipchart (Vietnamese)
Cervical screening – taking care of your health flipchart (Vietnamese)
 
5Cladba ADBB 5cladba buy 6cl adbb powder 5cl ADBB precursor materials
5Cladba ADBB 5cladba buy 6cl adbb powder 5cl ADBB precursor materials5Cladba ADBB 5cladba buy 6cl adbb powder 5cl ADBB precursor materials
5Cladba ADBB 5cladba buy 6cl adbb powder 5cl ADBB precursor materials
 

Howard County Brac Bit # 59

  • 1. HOWARD COUNTY BRAC TASK FORCE BRAC BIT: #59 DATE: 8 December 2009 SUBJECT(S): Event, Cyber Security Task Force, CYBER BITS POINT OF CONTACT: Kent Menser (410-313-6521) kmenser@howardcountymd.gov 1. Upcoming Event: a. BRAC Business Initiative In Progress Review (IPR) # 4 i. Date: 13 January, 8 AM to 10 AM ii. Location: Other Barn, 5851 Robert Oliver Pl # 2 Columbia, MD 21045-3728 (410) 730-4610 iii. Agenda: Major Defense Contractor Presentation In Progress Review Networking Between BBI Partners before and after the presentations 2. Discussion: a. Help! Our BBI Team needs the services of a volunteer who has relevant experience and savvy in the Defense Contracting business. Time is negotiable, salary is not! Contact Kent if you have the interest. b. Cyber Security Task Force: i. The Senate Select Committee on Intelligence announced today the formation of a bipartisan task force on cyber security. Senator Barbara Mikulski (D-Md.) and Senator Olympia Snowe (R-Maine) will serve as members of the task force, and Senator Sheldon Whitehouse (D-R.I.) will serve as task force chair. The task force will evaluate cyber threats to the United States and issue recommendations to the U.S. intelligence community as appropriate. The task force will complete its work by June 2010. ii. “Cyber security is a growing national security threat, and one I take very seriously,” Senator Mikulski said. “As a member of this new Senate Cyber Security Task Force, I will be working with my colleagues to provide guidance on how to better coordinate our defenses against the complex and evolving attacks by hackers and cyber spies that our nation faces each day. Cyber security has been of growing concern to me and my constituents since the devastating cyber attacks against Estonia two years ago. I look forward to continuing to work on this important issue.” c. BWI Business Partnership Meeting: At the Partnership meeting on 9 December, Senator Mikulski described how Team Maryland was working hard to bring Cyber Command to Maryland. She stated that if the subject command came to MD, it could bring up to 15,000 jobs, both federal and contractor. More will follow on this topic. d. Consequences of Fort Meade Growth: i. Today, about 90% of Fort Meade workers drive to work, with an average commute of about 20 miles. Following this pattern, the 22,000 new jobs coming to Fort Meade will generate serious traffic congestion in and around the installation. We will see increasing delays on MD-32, MD-295, MD 198 and MD-175 beginning in mid-2010 and continuing through 2020. Traffic diverting from this impact point will affect other nearby highways and intersections as well. ii. We knew early in the BRAC process that there would not be sufficient Federal / State funding for the necessary highway improvements. Therefore, we are going to have to initally think our way through this challenge. The “think vehicle” will be Transportation Demand Management (TMD). Simply put, more people in fewer vehicles, through the use of busses, van pools, car pools, telecommuting and more. The Fort Meade Regional Growth Management Committee’s Transportation Committee is working this issue. 3. CYBER BITS: ….”Allegations that China is behind, or likely behind, cyberattacks or cyber espionage against the United States are more frequent and more sensational, “said Wang Baodong, the spokesman at the Chinese Embassy in Washington. “Such accusations are unwarranted, irresponsible and misleading and intentionally fabricated to fan China threat sensations…….” Ellen Nakashima and John Pomfret, Washington Post, 11 November 2009