SlideShare una empresa de Scribd logo
1 de 15
The Need for Achieving  Appropriate Information Sharing  and Information Protection David A. Bray, PhD, MSPH  [email_address]
What is the ISE? ,[object Object],[object Object],[object Object],[object Object]
What is the ISE? ,[object Object],[object Object],[object Object],[object Object],Defense Intelligence Homeland Security  Diplomacy Law Enforcement Range of Missions Communities Information  Sharing  Environment Terrorism-related ,[object Object],[object Object],[object Object],[object Object]
What is the ISE? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Post-9/11 Information Sharing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Post-9/11 Information Sharing 2004 2006 - 2008  2005 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2010 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2009 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Post-9/11 Information Sharing 2007 2008 2009 2010 2011... ISE Priorities NARA NCTC DOJ DHS DHS DoJ, ODNI, DHS, FBI FBI, ODNI, DHS, DOD Controlled Unclassified Information (CUI) Interagency Threat Assessment and Coordination Group (ITACG) Nationwide SAR Initiative (NSI) Fusion Center (FC) Cargo Screening Assured SBU/CUI Interoperability Assured Secret  Network  Interoperability
Towards Sharing and Protecting ,[object Object],[object Object],-Markle Foundation, “Nation At Risk: Policy Makers Need Better Information to Protect the Country”
Towards Sharing and Protecting ,[object Object]
Towards Sharing and Protecting ,[object Object],[object Object],[object Object],[object Object]
On-going ISE Development Efforts  ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],On-going ISE Development Efforts
[object Object],[object Object],On-going ISE Development Efforts
On-going ISE Development Efforts  Requirements Across Departments and Agencies Interagency Information Integration Architecture and Governance Service Specifications, Including Reusable Components and IEPDs Contracted for Development by Industry or Government Reuse by Other Departments and Agencies Build, Test, and Certify Services, Reusable Components, and IEPDs    Greater Reuse Across Government of Services, Components, and IEPDs     Greater Demand Signal to Industry to Develop Standard Interagency Services
Questions?  David A. Bray, PhD, MSPH  [email_address] www.ise.gov ,[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Application development and emerging technologies.pptx
Application development and emerging technologies.pptxApplication development and emerging technologies.pptx
Application development and emerging technologies.pptxMichael Angelo Marasigan
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdfkristinatemen
 
IT 415 - Capstone Project Orientation
IT 415 - Capstone Project OrientationIT 415 - Capstone Project Orientation
IT 415 - Capstone Project OrientationSheryl Satorre
 
HCI - Chapter 1
HCI - Chapter 1HCI - Chapter 1
HCI - Chapter 1Alan Dix
 
AN INTRODUCTION TO EMERGING TECHNOLOGY
AN INTRODUCTION TO EMERGING TECHNOLOGYAN INTRODUCTION TO EMERGING TECHNOLOGY
AN INTRODUCTION TO EMERGING TECHNOLOGYVijay R. Joshi
 
Collaboration tools
Collaboration toolsCollaboration tools
Collaboration toolsNik Hil
 
Presentation on World Wide Web (WWW)
Presentation on World Wide Web (WWW)Presentation on World Wide Web (WWW)
Presentation on World Wide Web (WWW)Mohak Jain
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technologyactanimation
 
Hci user interface-design principals
Hci user interface-design principalsHci user interface-design principals
Hci user interface-design principalsAnwal Mirza
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technologymegat zainurul anuar
 
Information Management
Information ManagementInformation Management
Information ManagementNadeem Raza
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interactionsai anjaneya
 
Mobile Information Architecture
Mobile Information ArchitectureMobile Information Architecture
Mobile Information ArchitectureLifna C.S
 

La actualidad más candente (20)

Application development and emerging technologies.pptx
Application development and emerging technologies.pptxApplication development and emerging technologies.pptx
Application development and emerging technologies.pptx
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
IT 415 - Capstone Project Orientation
IT 415 - Capstone Project OrientationIT 415 - Capstone Project Orientation
IT 415 - Capstone Project Orientation
 
HCI - Chapter 1
HCI - Chapter 1HCI - Chapter 1
HCI - Chapter 1
 
Hci activity#1
Hci activity#1Hci activity#1
Hci activity#1
 
Essential computer concepts
Essential computer conceptsEssential computer concepts
Essential computer concepts
 
AN INTRODUCTION TO EMERGING TECHNOLOGY
AN INTRODUCTION TO EMERGING TECHNOLOGYAN INTRODUCTION TO EMERGING TECHNOLOGY
AN INTRODUCTION TO EMERGING TECHNOLOGY
 
Collaboration tools
Collaboration toolsCollaboration tools
Collaboration tools
 
History of the internet
History of the internetHistory of the internet
History of the internet
 
World Wide Web
World Wide WebWorld Wide Web
World Wide Web
 
Presentation on World Wide Web (WWW)
Presentation on World Wide Web (WWW)Presentation on World Wide Web (WWW)
Presentation on World Wide Web (WWW)
 
World Wide Web (WWW)
World Wide Web (WWW)World Wide Web (WWW)
World Wide Web (WWW)
 
System software
System softwareSystem software
System software
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
Hci user interface-design principals
Hci user interface-design principalsHci user interface-design principals
Hci user interface-design principals
 
Information System and Information Technology
Information System and Information TechnologyInformation System and Information Technology
Information System and Information Technology
 
Lecture 01 mis
Lecture 01 misLecture 01 mis
Lecture 01 mis
 
Information Management
Information ManagementInformation Management
Information Management
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interaction
 
Mobile Information Architecture
Mobile Information ArchitectureMobile Information Architecture
Mobile Information Architecture
 

Destacado (20)

Social dialogue and flexicurity
Social dialogue and flexicuritySocial dialogue and flexicurity
Social dialogue and flexicurity
 
Sharing of Information
Sharing of InformationSharing of Information
Sharing of Information
 
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Information security
Information securityInformation security
Information security
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
TRiO slideshow
TRiO slideshowTRiO slideshow
TRiO slideshow
 
Erin Schorr-5th
Erin Schorr-5th Erin Schorr-5th
Erin Schorr-5th
 
インターンの心得
インターンの心得インターンの心得
インターンの心得
 
The New Internet World
The New Internet WorldThe New Internet World
The New Internet World
 
Quello introduction
Quello introductionQuello introduction
Quello introduction
 
Ucar magazine june_10_2010
Ucar magazine june_10_2010Ucar magazine june_10_2010
Ucar magazine june_10_2010
 
Keep Your City Delicious!
Keep Your City Delicious!Keep Your City Delicious!
Keep Your City Delicious!
 

Similar a Information Sharing and Protection

Ise enterprise architecture and common standards program
Ise enterprise architecture and common standards programIse enterprise architecture and common standards program
Ise enterprise architecture and common standards programKaye Beach
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 
California Cyber Security Task Force - Status August 2014
California Cyber Security Task Force - Status August 2014California Cyber Security Task Force - Status August 2014
California Cyber Security Task Force - Status August 2014David Sweigert
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange ModelDavid Fletcher
 
What is CJIS Compliance?
What is CJIS Compliance?What is CJIS Compliance?
What is CJIS Compliance?DoubleHorn
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive OrderBooz Allen Hamilton
 
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022PECB
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationmikeecholscyber
 
Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)
Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)
Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)Clifton M. Hasegawa & Associates, LLC
 
ICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorPaul O'Connor
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Gao privacy updates
Gao privacy updatesGao privacy updates
Gao privacy updatesInes Mergel
 
Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Joshua L. Davis
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkETDAofficialRegist
 
Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy Valdes Nzalli
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 

Similar a Information Sharing and Protection (20)

Ise enterprise architecture and common standards program
Ise enterprise architecture and common standards programIse enterprise architecture and common standards program
Ise enterprise architecture and common standards program
 
Prof E Hewitt
Prof  E HewittProf  E Hewitt
Prof E Hewitt
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
California Cyber Security Task Force - Status August 2014
California Cyber Security Task Force - Status August 2014California Cyber Security Task Force - Status August 2014
California Cyber Security Task Force - Status August 2014
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange Model
 
Connect And Protect
Connect And ProtectConnect And Protect
Connect And Protect
 
What is CJIS Compliance?
What is CJIS Compliance?What is CJIS Compliance?
What is CJIS Compliance?
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
 
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
 
Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)
Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)
Hawaii - Governor David Ige - Leadership in Action - Information Technology (IT)
 
ICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'Connor
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Gao privacy updates
Gao privacy updatesGao privacy updates
Gao privacy updates
 
Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
 
Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy Government can save millions by reforming Security Policy
Government can save millions by reforming Security Policy
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 

Más de Oxford Martin Centre, OII, and Computer Science at the University of Oxford

Más de Oxford Martin Centre, OII, and Computer Science at the University of Oxford (20)

5th Estate Power Shift 2022.pptx
5th Estate Power Shift 2022.pptx5th Estate Power Shift 2022.pptx
5th Estate Power Shift 2022.pptx
 
Cybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the WorkplaceCybersecurity Capacity: from the Nation to the Workplace
Cybersecurity Capacity: from the Nation to the Workplace
 
Changing Workplaces and Cybersecurity.pptx
Changing Workplaces and Cybersecurity.pptxChanging Workplaces and Cybersecurity.pptx
Changing Workplaces and Cybersecurity.pptx
 
25SEP2022 WFH Slides.pptx
25SEP2022 WFH Slides.pptx25SEP2022 WFH Slides.pptx
25SEP2022 WFH Slides.pptx
 
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
The Fifth Estate and Its Future
 
5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University5th Estate presentation for Indonesia University
5th Estate presentation for Indonesia University
 
Dutton power corrupts-2021
Dutton power corrupts-2021Dutton power corrupts-2021
Dutton power corrupts-2021
 
Cybersecurity Day for Parliament
Cybersecurity Day for ParliamentCybersecurity Day for Parliament
Cybersecurity Day for Parliament
 
GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
 
The Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth EstateThe Internet, Democracy and the Fifth Estate
The Internet, Democracy and the Fifth Estate
 
Digital Divides tprc-2019
Digital Divides tprc-2019Digital Divides tprc-2019
Digital Divides tprc-2019
 
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
 
Future of public broadcasting and a university
Future of public broadcasting and a universityFuture of public broadcasting and a university
Future of public broadcasting and a university
 
Social media realitie lisbon-2018
Social media realitie lisbon-2018Social media realitie lisbon-2018
Social media realitie lisbon-2018
 
Search&politics lisbon-2018
Search&politics lisbon-2018Search&politics lisbon-2018
Search&politics lisbon-2018
 
Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017Broadband to Neighborhood 18 dec 2017
Broadband to Neighborhood 18 dec 2017
 
Internet, Search and Threats to News Ecosystem
Internet, Search and Threats to News EcosystemInternet, Search and Threats to News Ecosystem
Internet, Search and Threats to News Ecosystem
 
Search&politics bruegel-25 oct2017
Search&politics bruegel-25 oct2017Search&politics bruegel-25 oct2017
Search&politics bruegel-25 oct2017
 

Último

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Último (20)

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Information Sharing and Protection

  • 1. The Need for Achieving Appropriate Information Sharing and Information Protection David A. Bray, PhD, MSPH [email_address]
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. On-going ISE Development Efforts Requirements Across Departments and Agencies Interagency Information Integration Architecture and Governance Service Specifications, Including Reusable Components and IEPDs Contracted for Development by Industry or Government Reuse by Other Departments and Agencies Build, Test, and Certify Services, Reusable Components, and IEPDs  Greater Reuse Across Government of Services, Components, and IEPDs  Greater Demand Signal to Industry to Develop Standard Interagency Services
  • 15.