Presentations

Mission Solutions for Homeland Security

Mission Solutions for Homeland Security

Joe Cloyd is the Technical Fellow & Director, Network Solutions OU at Northrop Grumman Technology Services. He discusses securing wireless communications for first responders, ensuring reliability and survivability of products in austere environments, and utilizing custom flexibility solutions to meet changing plans and mission sets.
Nuclear Terrorism Impacts and Zoned Approach to Response

Nuclear Terrorism Impacts and Zoned Approach to Response

Josh Dozor is the Director, Planning Division, Response Directorate at the Federal Emergency Management Agency. He discusses understanding the full severity of nuclear terrorism threats, deep dive into DHS plans and policy for responding to an incident, and developing cross departmental relationship to ensure effective response.
Requirements for Biometrics and Technical Support to Homeland Security Investigations

Requirements for Biometrics and Technical Support to Homeland Security Investigations

SA Rodger L. Werner, Unit Chief, ISIM, ICE-HSI gives an overview of current Homeland Security Investigations, facial/iris/voice biometrics requirements, and multi-sensor data fusion.
“Finding The Needle In The Haystack”

“Finding The Needle In The Haystack”

Gain New Methods For Effectively Sorting Through Large Amounts Of Video Data

  • Advancing capabilities to process, exploit and disseminate data to deliver actionable intelligence
  • Real time analysis, filtering data as it is collected to enhance operations
  • Integrating data with open architecture and flexible systems

Dr. Terry Adams, Program Manager Intelligence Advanced Research, Projects Activity (IARPA)

The 5 Pillars of the DHS's Cybersecurity Strategy

The 5 Pillars of the DHS's Cybersecurity Strategy

On May 16, 2018 the Department of Homeland Security released a new strategy to provide the Department with a framework to execute their cybersecurity responsibilities during the next five years. This approach is designed to help them keep pace with the evolving cyber risk landscape by reducing vulnerabilities and building resilience, countering malicious actors in cyberspace, responding to incidents and making the cyber ecosystem more secure and resilient.

This slideshow highlights the key priorities and objectives and goals outlined in the U.S. Department of Homeland Security Cybersecurity Strategy including:

  • The 5 Pillar's of the DHS-wide risk management approach
  • DHS's 7 goals for maximizing its unique resources to accomplish impactful policy and operational outcomes 
  • 7 guiding principles for ensuring cybersecurity efforts are consistent with our national values
Best Practices in Maintaining Non-Intrusive Inspection Systems

Best Practices in Maintaining Non-Intrusive Inspection Systems

Covers Enterprise Asset Management (EAM) best practices developed by STS over the past five (5) years to maintain Non-Intrusive Inspection (NII) systems in an austere environment