SlideShare a Scribd company logo
The Need for Achieving  Appropriate Information Sharing  and Information Protection David A. Bray, PhD, MSPH  [email_address]
What is the ISE? ,[object Object],[object Object],[object Object],[object Object]
What is the ISE? ,[object Object],[object Object],[object Object],[object Object],Defense Intelligence Homeland Security  Diplomacy Law Enforcement Range of Missions Communities Information  Sharing  Environment Terrorism-related ,[object Object],[object Object],[object Object],[object Object]
What is the ISE? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Post-9/11 Information Sharing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Post-9/11 Information Sharing 2004 2006 - 2008  2005 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2010 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2009 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Post-9/11 Information Sharing 2007 2008 2009 2010 2011... ISE Priorities NARA NCTC DOJ DHS DHS DoJ, ODNI, DHS, FBI FBI, ODNI, DHS, DOD Controlled Unclassified Information (CUI) Interagency Threat Assessment and Coordination Group (ITACG) Nationwide SAR Initiative (NSI) Fusion Center (FC) Cargo Screening Assured SBU/CUI Interoperability Assured Secret  Network  Interoperability
Towards Sharing and Protecting ,[object Object],[object Object],-Markle Foundation, “Nation At Risk: Policy Makers Need Better Information to Protect the Country”
Towards Sharing and Protecting ,[object Object]
Towards Sharing and Protecting ,[object Object],[object Object],[object Object],[object Object]
On-going ISE Development Efforts  ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],On-going ISE Development Efforts
[object Object],[object Object],On-going ISE Development Efforts
On-going ISE Development Efforts  Requirements Across Departments and Agencies Interagency Information Integration Architecture and Governance Service Specifications, Including Reusable Components and IEPDs Contracted for Development by Industry or Government Reuse by Other Departments and Agencies Build, Test, and Certify Services, Reusable Components, and IEPDs    Greater Reuse Across Government of Services, Components, and IEPDs     Greater Demand Signal to Industry to Develop Standard Interagency Services
Questions?  David A. Bray, PhD, MSPH  [email_address] www.ise.gov ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Organizational Communication
Organizational CommunicationOrganizational Communication
Organizational Communication
amanideutsch
 
Building and Sustaining Trust for Leaders
Building and Sustaining Trust for LeadersBuilding and Sustaining Trust for Leaders
Building and Sustaining Trust for Leaders
Kris Mailepors, MBA
 
Elements of communication process
Elements of communication processElements of communication process
Elements of communication process
niroshani senevirathna
 
Communication Skills
Communication Skills Communication Skills
Communication Skills
Taleb Hammad
 
Barriers to communication
Barriers to communication Barriers to communication
Barriers to communication
NEO NEWS NETWORK
 
Effevtive workplace communication
Effevtive workplace communicationEffevtive workplace communication
Effevtive workplace communication
Hyacinth Ubah
 
Psychological safety how to build a powerful culture - Webinar
Psychological safety how to build a powerful culture - Webinar Psychological safety how to build a powerful culture - Webinar
Psychological safety how to build a powerful culture - Webinar
Liberationist, Change Leadership
 
How Leaders Create Accountability Webinar
How Leaders Create Accountability WebinarHow Leaders Create Accountability Webinar
How Leaders Create Accountability Webinar
Avail Leadership
 
177900 633758259289737500
177900 633758259289737500177900 633758259289737500
177900 633758259289737500
Riju Nair
 
managerial communication
managerial communicationmanagerial communication
managerial communication
Santosh Hanchanal
 
Effective Professional Communication
Effective Professional CommunicationEffective Professional Communication
Effective Professional Communication
Aurora Computer Studies
 
5 Factors of a Positive Work Environment
5 Factors of a Positive Work Environment5 Factors of a Positive Work Environment
5 Factors of a Positive Work Environment
Graham Zahoruiko
 
Formal and informal communication
Formal and informal communicationFormal and informal communication
Formal and informal communication
LenraLigaya
 
People Management
People ManagementPeople Management
People Management
Chetana Mehta
 
Improving Your Leadership Communication
Improving Your Leadership CommunicationImproving Your Leadership Communication
Improving Your Leadership Communication
James G. Bohn, Ph.D.
 
Workplace Communication Generic
Workplace Communication GenericWorkplace Communication Generic
Workplace Communication Generic
Fitz Agard
 
Building a Culture of Feedback
Building a Culture of FeedbackBuilding a Culture of Feedback
Building a Culture of Feedback
Next Jump
 
Communication in the Workplace
Communication in the WorkplaceCommunication in the Workplace
Communication in the Workplace
Jubayer Alam Shoikat
 
Communication Skills.drjma
Communication Skills.drjmaCommunication Skills.drjma
Presentation [Full] Effective Communication Skills
Presentation [Full]  Effective Communication SkillsPresentation [Full]  Effective Communication Skills
Presentation [Full] Effective Communication Skills
Paven Garibandi
 

What's hot (20)

Organizational Communication
Organizational CommunicationOrganizational Communication
Organizational Communication
 
Building and Sustaining Trust for Leaders
Building and Sustaining Trust for LeadersBuilding and Sustaining Trust for Leaders
Building and Sustaining Trust for Leaders
 
Elements of communication process
Elements of communication processElements of communication process
Elements of communication process
 
Communication Skills
Communication Skills Communication Skills
Communication Skills
 
Barriers to communication
Barriers to communication Barriers to communication
Barriers to communication
 
Effevtive workplace communication
Effevtive workplace communicationEffevtive workplace communication
Effevtive workplace communication
 
Psychological safety how to build a powerful culture - Webinar
Psychological safety how to build a powerful culture - Webinar Psychological safety how to build a powerful culture - Webinar
Psychological safety how to build a powerful culture - Webinar
 
How Leaders Create Accountability Webinar
How Leaders Create Accountability WebinarHow Leaders Create Accountability Webinar
How Leaders Create Accountability Webinar
 
177900 633758259289737500
177900 633758259289737500177900 633758259289737500
177900 633758259289737500
 
managerial communication
managerial communicationmanagerial communication
managerial communication
 
Effective Professional Communication
Effective Professional CommunicationEffective Professional Communication
Effective Professional Communication
 
5 Factors of a Positive Work Environment
5 Factors of a Positive Work Environment5 Factors of a Positive Work Environment
5 Factors of a Positive Work Environment
 
Formal and informal communication
Formal and informal communicationFormal and informal communication
Formal and informal communication
 
People Management
People ManagementPeople Management
People Management
 
Improving Your Leadership Communication
Improving Your Leadership CommunicationImproving Your Leadership Communication
Improving Your Leadership Communication
 
Workplace Communication Generic
Workplace Communication GenericWorkplace Communication Generic
Workplace Communication Generic
 
Building a Culture of Feedback
Building a Culture of FeedbackBuilding a Culture of Feedback
Building a Culture of Feedback
 
Communication in the Workplace
Communication in the WorkplaceCommunication in the Workplace
Communication in the Workplace
 
Communication Skills.drjma
Communication Skills.drjmaCommunication Skills.drjma
Communication Skills.drjma
 
Presentation [Full] Effective Communication Skills
Presentation [Full]  Effective Communication SkillsPresentation [Full]  Effective Communication Skills
Presentation [Full] Effective Communication Skills
 

Viewers also liked

Social dialogue and flexicurity
Social dialogue and flexicuritySocial dialogue and flexicurity
Social dialogue and flexicurity
Dagoberto Godoy
 
Sharing of Information
Sharing of InformationSharing of Information
Sharing of Information
Employment Crossing
 
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
Priyanka Aash
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
WonderingAriana
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Geoffrey Lowe
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
learnt
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Gareth Davies
 
Information security
Information securityInformation security
Information security
LJ PROJECTS
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
Kak Yong
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dr. Loganathan R
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
TRiO slideshow
TRiO slideshowTRiO slideshow
TRiO slideshow
NoralyGuerrero
 
Erin Schorr-5th
Erin Schorr-5th Erin Schorr-5th
Erin Schorr-5th
schorr107818
 
インターンの心得
インターンの心得インターンの心得
インターンの心得
比留木 武泰
 
The New Internet World
The New Internet WorldThe New Internet World
Quello introduction
Quello introductionQuello introduction
Ucar magazine june_10_2010
Ucar magazine june_10_2010Ucar magazine june_10_2010
Ucar magazine june_10_2010
Mlagrave
 
Keep Your City Delicious!
Keep Your City Delicious!Keep Your City Delicious!
Keep Your City Delicious!
a-small-lab
 

Viewers also liked (20)

Social dialogue and flexicurity
Social dialogue and flexicuritySocial dialogue and flexicurity
Social dialogue and flexicurity
 
Sharing of Information
Sharing of InformationSharing of Information
Sharing of Information
 
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Information security
Information securityInformation security
Information security
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
TRiO slideshow
TRiO slideshowTRiO slideshow
TRiO slideshow
 
Erin Schorr-5th
Erin Schorr-5th Erin Schorr-5th
Erin Schorr-5th
 
インターンの心得
インターンの心得インターンの心得
インターンの心得
 
The New Internet World
The New Internet WorldThe New Internet World
The New Internet World
 
Quello introduction
Quello introductionQuello introduction
Quello introduction
 
Ucar magazine june_10_2010
Ucar magazine june_10_2010Ucar magazine june_10_2010
Ucar magazine june_10_2010
 
Keep Your City Delicious!
Keep Your City Delicious!Keep Your City Delicious!
Keep Your City Delicious!
 

Similar to Information Sharing and Protection

Ise enterprise architecture and common standards program
Ise enterprise architecture and common standards programIse enterprise architecture and common standards program
Ise enterprise architecture and common standards program
Kaye Beach
 
Prof E Hewitt
Prof  E HewittProf  E Hewitt
Prof E Hewitt
Errol Hewitt. MSCP, BA
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
hartrobert670
 
California Cyber Security Task Force - Status August 2014
California Cyber Security Task Force - Status August 2014California Cyber Security Task Force - Status August 2014
California Cyber Security Task Force - Status August 2014
David Sweigert
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange Model
David Fletcher
 
Connect And Protect
Connect And ProtectConnect And Protect
Connect And Protect
Future Position X
 
What is CJIS Compliance?
What is CJIS Compliance?What is CJIS Compliance?
What is CJIS Compliance?
DoubleHorn
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
Booz Allen Hamilton
 
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
PECB
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Great Wide Open
 
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
mikeecholscyber
 
Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)
Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)
Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)
Clifton M. Hasegawa & Associates, LLC
 
ICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'Connor
Paul O'Connor
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
GovCloud Network
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
msdee3362
 
Gao privacy updates
Gao privacy updatesGao privacy updates
Gao privacy updates
Ines Mergel
 
Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)
Joshua L. Davis
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
ETDAofficialRegist
 
Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy
Valdes Nzalli
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
Evan Pathiratne
 

Similar to Information Sharing and Protection (20)

Ise enterprise architecture and common standards program
Ise enterprise architecture and common standards programIse enterprise architecture and common standards program
Ise enterprise architecture and common standards program
 
Prof E Hewitt
Prof  E HewittProf  E Hewitt
Prof E Hewitt
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
California Cyber Security Task Force - Status August 2014
California Cyber Security Task Force - Status August 2014California Cyber Security Task Force - Status August 2014
California Cyber Security Task Force - Status August 2014
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange Model
 
Connect And Protect
Connect And ProtectConnect And Protect
Connect And Protect
 
What is CJIS Compliance?
What is CJIS Compliance?What is CJIS Compliance?
What is CJIS Compliance?
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
 
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
 
Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)
Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)
Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)
 
ICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'Connor
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Gao privacy updates
Gao privacy updatesGao privacy updates
Gao privacy updates
 
Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
 
Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 

More from Oxford Martin Centre, OII, and Computer Science at the University of Oxford

5th Estate Power Shift 2022.pptx
5th Estate Power Shift 2022.pptx5th Estate Power Shift 2022.pptx
Cybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the WorkplaceCybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the Workplace
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Changing Workplaces and Cybersecurity.pptx
Changing Workplaces and Cybersecurity.pptxChanging Workplaces and Cybersecurity.pptx
25SEP2022 WFH Slides.pptx
25SEP2022 WFH Slides.pptx25SEP2022 WFH Slides.pptx
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Dutton power corrupts-2021
Dutton power corrupts-2021Dutton power corrupts-2021
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)GFCE 2019 Presentation (Updated Nov 2019)
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
The Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth EstateThe Internet, Democracy and the Fifth Estate
Digital Divides tprc-2019
Digital Divides tprc-2019Digital Divides tprc-2019
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Future of public broadcasting and a university
Future of public broadcasting and a universityFuture of public broadcasting and a university
Social media realitie lisbon-2018
Social media realitie lisbon-2018Social media realitie lisbon-2018
Search&politics lisbon-2018
Search&politics lisbon-2018Search&politics lisbon-2018
Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017Broadband to Neighborhood 18 dec 2017
Internet, Search and Threats to News Ecosystem
Internet, Search and Threats to News EcosystemInternet, Search and Threats to News Ecosystem
Search&politics bruegel-25 oct2017
Search&politics bruegel-25 oct2017Search&politics bruegel-25 oct2017

More from Oxford Martin Centre, OII, and Computer Science at the University of Oxford (20)

5th Estate Power Shift 2022.pptx
5th Estate Power Shift 2022.pptx5th Estate Power Shift 2022.pptx
5th Estate Power Shift 2022.pptx
 
Cybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the WorkplaceCybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the Workplace
 
Changing Workplaces and Cybersecurity.pptx
Changing Workplaces and Cybersecurity.pptxChanging Workplaces and Cybersecurity.pptx
Changing Workplaces and Cybersecurity.pptx
 
25SEP2022 WFH Slides.pptx
25SEP2022 WFH Slides.pptx25SEP2022 WFH Slides.pptx
25SEP2022 WFH Slides.pptx
 
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
The Fifth Estate and Its Future
 
5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University
 
Dutton power corrupts-2021
Dutton power corrupts-2021Dutton power corrupts-2021
Dutton power corrupts-2021
 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
 
GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
 
The Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth EstateThe Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth Estate
 
Digital Divides tprc-2019
Digital Divides tprc-2019Digital Divides tprc-2019
Digital Divides tprc-2019
 
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
 
Future of public broadcasting and a university
Future of public broadcasting and a universityFuture of public broadcasting and a university
Future of public broadcasting and a university
 
Social media realitie lisbon-2018
Social media realitie lisbon-2018Social media realitie lisbon-2018
Social media realitie lisbon-2018
 
Search&politics lisbon-2018
Search&politics lisbon-2018Search&politics lisbon-2018
Search&politics lisbon-2018
 
Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017
 
Internet, Search and Threats to News Ecosystem
Internet, Search and Threats to News EcosystemInternet, Search and Threats to News Ecosystem
Internet, Search and Threats to News Ecosystem
 
Search&politics bruegel-25 oct2017
Search&politics bruegel-25 oct2017Search&politics bruegel-25 oct2017
Search&politics bruegel-25 oct2017
 

Recently uploaded

Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

Information Sharing and Protection

  • 1. The Need for Achieving Appropriate Information Sharing and Information Protection David A. Bray, PhD, MSPH [email_address]
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. On-going ISE Development Efforts Requirements Across Departments and Agencies Interagency Information Integration Architecture and Governance Service Specifications, Including Reusable Components and IEPDs Contracted for Development by Industry or Government Reuse by Other Departments and Agencies Build, Test, and Certify Services, Reusable Components, and IEPDs  Greater Reuse Across Government of Services, Components, and IEPDs  Greater Demand Signal to Industry to Develop Standard Interagency Services
  • 15.