Building a fraud fortress. Fraud Report

Size: px
Start display at page:

Download "Building a fraud fortress. Fraud Report"

Transcription

1 Fraud Report Building a fraud fortress Fraud is ever-changing and ever-present. Find out how businesses like yours can protect your customers, your staff, and your company

2 Fraud Report Education is clearly an important fraud prevention tool. But if businesses lack the right verification and fraud prevention technologies, they re giving themselves little chance. John Cannon, Managing Director, Fraud and ID, TransUnion 2

3 Contents 4 Foreword 6 Fraud in Where fraud bites 11 Fightback tactics 15 The building blocks for a fraud fortress 18 The fraud fortress 3

4 Fraud Report Foreword White collar crime, also called fraud or (a) scam, has been with us for a while. DR. DAVID MODIC Research Associate, Computer Laboratory at Cambridge University REFERENCES Luce, H. R. (1963, 28th of June). Actors: The Mild One. Time Magazine, LXXXI/26. AUTHOR NOTE Article commissioned by Octopus Group and Callcredit. CORRESPONDING AUTHOR S ADDRESS: Dr. David Modic Computer Laboratory William Gates Building Cambridge University 15 JJ Thomson Avenue Cambridge CB3 0FD Even some of the terms themselves are fairly old. The word fraud comes from Latin (i.e. fraudem; to cheat, swindle, embezzle). The term scam was first used in the early sixties by the actor Steve McQueen in a Time Magazine interview (Luce, 1963). Ben Jonson wrote the play Volpone in Volpone is a play about a con-man scamming his friends and getting away with it. There had to be scammers around at that time, for Jonson to write about them. There are documented cases of what are now defined as Nigerian 419 scams appearing in the 16th Century (they were called the Spanish prisoner letters) where a minor nobility would receive a letter informing them that their distant relative is imprisoned in Spain and they would need to pay ransom to be released. Said ransom would of course be returned to the aristocrat in question as soon as their second cousin Archie was released. We all know where this is going... 4

5 These scams that appeared 400 years ago were focusing on people and exploiting their inability to correctly evaluate fraudulent communications. They were, in effect, pushing the same buttons that fraudsters and black-hats do now. Therefore, scams are not new, pre-dating the internet significantly. Currently, we seem to have regressed to a certain extent. It used to be that people were the ones who were exploited by fraudsters before the internet was a glimmer in its creator s eye. With the widespread use of digital technologies, the delivery vehicle changed but the underlying mechanics remained similar. However, in the early days, IT was an emerging technology which was not inherently secure, thus it became easier to explore holes that the idealists creating it did not foresee would need closing. Suddenly, the infrastructure bore the brunt of the attacks. As a consequence, we developed an industry, designed to protect businesses through protecting their equipment. And we are protecting users and employees themselves almost as an afterthought. In Cambridge University, our intrusion detection system (IDS) detect approximately 10,000 intrusion attempts per day, and approximately 200,000 attempts per month. The CamCERT team receives reports of approximately 1700 incidents per month, where individuals have breached our defenses in certain ways. Crucially, practically all of these breaches (99.9%) include exploitation of human vectors. Cambridge University runs by far the largest private digital network in Europe. We do not know how many machines are connected to it, but we do know that we have assigned in excess of 250,000 IP addresses (if we include some of our NAT [Network Address Translation] connections). Clearly, based on observational data, we can infer that in a network like ours, there is an absolute need for mechanical deterrents. Otherwise we would have 200,000 breaches per month. However, it is also clear that mechanical measures are not enough. Exploiting humans is cheaper, easier and requires less specialist knowledge, compared to exploiting machines. Thus, we should focus on people too, when it comes to security. There is not much previous empirical data showing how much attention security companies pay to social engineering. While our netflow / IDS data shows humanbased attack vectors to be overwhelmingly present in successful breaches, we were not sure whether the industry in general is paying any attention to this. Therefore, we decided to establish a baseline by asking professionals and fraud leaders to tell us more about the threats they are facing, the procedures they have in place to combat the emerging threats and their intentions of investing time and resources to improve their businesses resistance. The present report confirms some of our expectations concerning business engagement with social engineering threats and highlights some of the emerging threat responses in a new and interesting light. 5

6 Fraud Report Fraud in 2018 Historically, fraud has been a human problem. The criminally minded have looked for vulnerabilities and frailties in the honest, seeking to exploit them for immediate financial gain. Unlike many other crimes, there s a level of intelligence and creativity to fraud. Perpetrators are constantly searching for new ways to gain an advantage. Meaning that businesses are frequently playing catch up. This means that while fraud is a human problem, the fightback to it must be designed to help humans out with intelligent, future-focused solutions. As this report will detail, education and training can only be part of the answer. Technology has a huge part to play, through innovations such as identity verification, biometrics and AI. Anyone who wants to turn their business into a fraud fortress needs to consider each of these, otherwise there ll only be one winner in the battle with fraud. KEY RESEARCH FINDINGS 90% pinpoint implementing fraud prevention technology as a priority for 2018, up from 76% in % will be looking at identification verification measures, up from 75% in % suggest that data breaches are going to be a key security threat in 2018, with identity fraud an issue for 37% and social engineering for 31% 45% say attempts against authentication systems is the threat they experience most often 25% think their technology can fully protect them against the threat of computer-based fraud 6 RESEARCH METHODOLOGY TransUnion (formerly Callcredit) worked in conjunction with London-based research agency Loudhouse to conduct a survey on fraud prevention in May We spoke to 105 Fraud Prevention Managers and Directors. Respondents were sourced from a variety of industries, including IT, retail and local government

7 Fraud Fortress (noun) frɔːd/ /ˈfɔːtrɪs/ A fraud fortress is a combination of fraud prevention technologies and staff and user education that makes a business or organisation more resilient to fraud. It encapsulates the best ID verification and intelligence-based systems to stop fraud before it affects a business; and twins them with a programme to help all stakeholders within a business to understand modern fraud vectors and how to recognise when fraud might be taking place. Building a fraud fortress is essential to fraud prevention in 2018 and beyond. 7

8 Fraud Report Where fraud bites While fraud has been a consistent threat to businesses for years, 2017 saw a shift in what the primary fraud vectors are. And things are expected to change again in a few years time, as technology and fraud sophistication both develop. Over the past year fraud managers report a substantial rise in the threat posed by data breaches caused by malicious employees (up to 63% from 41% in 2017), or other internal factors. Likewise malicious external loss is on the rise (50% from 42%). However, these growing threats should not distract attention from identity fraud and phishing, both of which are still a threat for approximately a third of respondents, thereby still representing a huge challenge in fraud prevention. Particularly as the most frequently experienced threats according to our respondents are attempts against authentication systems (45%), attempts against web services (43%) and phishing (42%), as Fig. 1 details. What we re seeing is fraudsters continuing to look for vulnerabilities within businesses, where technology is not sufficient to counter the scale of the threat they present. They re posing as customers and many businesses are falling for it, losing money, trust and reputation in the process. The trouble is that many of these fraudsters are not faceless criminals, they re employees and contractors. Fraud managers can t take their eye off the ball. They must recognise that the threats they face come from within their own walls, as well as from external agents. And that their verification and protection measures must work for both these groups. FIG. 1: THREATS EXPERIENCED FREQUENTLY OR CONSTANTLY Attempts against authentication systems 45% Attempts against web-based services 43% Phishing attempts 42% Attempts against company s infrastructure 39% State actor backed disclosure requests 35% Spear-phishing attempts 26% Other 38% 8

9 Are businesses well equipped? The problem here is that managers working in fraud are not always as confident as they should be in their company s technological ability to meet the challenges posed by fraudsters. This is a problem when recent research from CIFAS found that 175,000 cases of fraud were reported in 2017 (125% more than ten years ago). Just 17% of respondents feel that technology is a foolproof method of fraud prevention. And they view it as no more likely to protect them against computer-based or human security breaches which Fig. 2 expands on. FIG.2: CONFIDENCE THAT TECHNOLOGY CAN FULLY PROTECT ORGANISATIONS 53% 16% 6%...from the threat of computer-based security breaches 25% Clearly, fraud managers feel that they need more from prevention technologies. As a result, it s perhaps unsurprising to see that some of the most common prevention initiatives are human based, such as employee education (66%), customer education (45%) and policies (31%). With better frontline protection through robust ID verification and fraud prevention technology, employees and customers will be better protected by default, meaning that education becomes the supplementary protection, not the primary form of defence. 54% 18% 1%...from the threat of human security breaches 27% Very confident Fairly confident Not particularly confident Not at all confident 9

10 Fraud Report What do businesses do when an employee is exploited by fraudsters? This research shows that businesses take a range of measures when an employee is the focus of a fraud attack. The graph below highlights that almost as many are likely to dismiss an employee as hold a meeting about what s happened. PUNITIVE ACTIONS TAKEN WHEN INTERNAL FRAUD OCCURS Monitor PC activity of specific individual Internal meetings with staff/work groups 68% 57% 66% Company-wide communication Written warning to specific individuals Dismissal of specific individual 56% CIFAS reports that 95% of fraud cases involve the fraudster using the identity of an innocent victim. Our Trust & Risk Suites are designed to counter this problem helping businesses to identify risk and establish trust that the person they re talking to is the customer they say they are. 56% John Cannon, Managing Director, Fraud and ID, TransUnion 10

11 Fightback tactics Fraud managers know their stuff. They re keenly aware of the difficult environment they re working within, and what threats they are facing. Accordingly, our survey reveals substantial fightback measures are taking place. However, as has been alluded to, these are not always the right measures or weighted in the right way. Where is the fightback happening? The research reveals that the most common technologies used to combat fraud are log on (52%), traditional antivirus solutions (50%) and surveillance (45%). Interestingly fraud managers see technology being increasingly important in preventing fraud in the future, with AI (45%), machine learning (37%) and biometric screening (37%). But, clearly, their current toolkit is not sufficient for the battle of today. Fraud managers need more and want more to counter the ongoing threat posed to their businesses by malicious agents (both internal and external). This point is emphasised further by Fig. 3, which shows a substantial gap between what fraud prevention is happening and what managers would like to see happening. They want a move from theoretical measures towards more practical ones. But to do this requires a strategic change in how fraud prevention is managed within businesses. FIG. 3: FRAUD PREVENTION SOLUTIONS CURRENTLY USED/LIKE TO DEPLOY Employee training 18% 71% Security team training 54% Security policy testing and modifying 25% 63% Silver team/ live exercises 25% 43% Employee drills 42% Currently use Like to deploy 11

12 Fraud Report Resource is imperative As things stand, both technology and people are used to fight fraud. And there s a growing case to say that neither are currently sufficiently robust to deal with the fraud challenges businesses are facing but with a little work, they can be. Indeed, Fig. 4 reveals that a worryingly high proportion of fraud managers believe that they will be hit with a breach if their current technology, tools and processes don t change. And only a very small minority think they re well protected. At its heart, the change in the fraud fightback is a question of resource. Fraud managers know what they re dealing with and they have an idea of how to react to it. But they ll only get there with proper backing from their businesses. Interestingly, 52% of fraud managers feel more confident in technology solutions than they did a year ago (33% feel the same about human). Suggesting that they know the proposed direction of travel for fraud prevention. The final section of this report explores what a fraud fortress should look like, with a combination of education, understanding and core fraud prevention technologies like ID verification. Investment is essential. Businesses really need to back their fraud managers and help them to get smarter with their human and technological resources; and smarter in their response to serious fraud. FIG. 4: EXPECTED TIMESCALE BEFORE SECURITY BREACH GIVEN CURRENT TECHNOLOGY AND PROCESSES 15% 9% 17% 28% It s already happened Less than 6 months 31% 6 months 1 year 1 2 years Don t see this happening/fully confident in our access management security 12

13 Are humans more vulnerable than technology? The research looked at where the most vulnerable attack vectors are: with humans, or with technology. Findings reveal that fraud leaders are no more likely to feel a threat from one than the other. Suggesting again that any solution should adequately cover both. 29% 43% 23% 2% We are more vulnerable to a technology based attack 4% 2% 26% 44% 24% We are more vulnerable to a human based attack 5% Strongly agree Tend to agree Tend to disagree Strongly disagree Don t know We re seeing that fraud managers know the direction they want to go in with prevention tactics. They want better technology to keep their businesses safe. Now they need high level backing. John Cannon, Managing Director, Fraud and ID, TransUnion 13

14 Fraud Report The building blocks for a fraud fortress 14

15 If there s one common trait that all fraudsters have, it s that they re smart. This is a big problem for businesses, who need to be smarter, faster and more thorough than fraudsters if they re ever going to get ahead of them. Fig. 5 shows us that businesses are able to establish a level of detail about the event and the perpetrator when a fraud event occurs. Whilst it is harder for businesses to get their hands on personal information or names of the perpetrator, it s important to note that factors including region, and telephone numbers are commonly collected pieces of information. These could also act as key fraud indicators crucial tells that give businesses more information about their attackers and allows them to identify risk before an attack takes place. This neatly demonstrates the advantage fraudsters currently have right now, as they re able to go one better than those they re defrauding. Meanwhile businesses are constantly on the back foot. This is where things need to change, and where businesses need to help their fraud managers to build a fraud fortress. Businesses need to understand current and future fraud risk indicators, and have the technological capacity to identify these and stop fraud at the first opportunity. FIG. 5: FREQUENCY THAT INFORMATION ABOUT PERPETRATORS OF FRAUD IS LEARNED Exact time of attack 24% 39% 6% 2% ISPs or service providers used in the attack 23% 38% 9% 1% Country or origin of attack 23% 35% 10% 3% 12% 38% 16% 4% Telephone numbers 12% 31% 39% 10% 7% Organisation behind the attack 12% 34% 15% 8% Their final hop IP address(es) 14% 28% 36% 14% 8% Personal info of the perpetrator 10% 32% 26% 21% 11% Name of the perpetrator 11% 27% 23% 10% Always Mostly Occasionally Rarely Never 15

16 Fraud Report The building blocks According to 59% of respondents, a layered approach comprising technology and human-based solutions is needed to tackle fraud today. Meanwhile, 58% agree that machine learning and pattern recognition will be vital to future fraud prevention activities; and 42% rank a fraud response strategy as one of their top three priorities. What this layered, strategic approach looks like will differ by business, according to their risk appetite, products offered, and channels used to service customers. However, there are some general things most respondents agree on. These split between the human and the technological. 1 Technology The primary element to an effective fraud fortress is technology. The research shows that AI, machine learning and biometrics all have a part to play (Fig. 6). And 59% are set to increase expenditure on the latter, boosting their fraud prevention mechanisms with it. However, one of the foremost technologies that will perform a major role in fraud prevention going forward is implementing ID verification. Indeed, 90% see it as a priority in 2018, up from 75% in While, on a similar note, introducing higher verification rates will be a priority for 78%. What we re seeing here is that fraud managers understand that they need to get the basics on fraud prevention right as they face changing and complex threats. And that it s only by having these core technological foundations in place that they ll be set up to battle fraud and fraudsters particularly as data breaches becomes the primary attack vector over the coming years. FIG. 6: TECHNOLOGIES TO DEPLOY IN 2 3 YEARS Artificial intelligence Machine learning Biometric screening techniques URL tracking Voice recognition systems Behavioural analytics Traditional solution antivirus/antispam Surveillance Two factor/knowledge-based authentications Unique IDs systems Log-in details Sandboxing 32% 27% 24% 23% 22% 20% 19% 37% 37% 45% 16

17 2 Human Technology is a mainstay of a fraud fortress. But education and customer/staff understanding is important, too. As things stand, just 26% provide ongoing training on fraud. Yet 60% find it to be an effective measure and 66% think that only by exposing people to real fraud scenarios will they be able to cope with the real thing. Crucially, this training needs to be for everyone. As Fig. 7 suggests, all levels of employees are being targeted by fraudsters. Therefore all need to know about what fraud looks like, and what their businesses are doing to protect them. 90% of fraud leaders see implementing ID verification as a priority for 2018 FIG. 7: FREQUENCY OF EMPLOYEES FALLING VICTIM TO PSYCHOLOGICAL MANIPULATIONS Board or managment 10% 20% 10% Middle management 10% 24% 33% 27% 6% General managment 9% 21% 37% 26% 8% Constantly Frequently Occasionally Rarely Never 17

18 Fraud Report The fraud fortress Fraudsters love technology. It gives them more opportunities than they ve ever had before to target businesses and people. And in new and different ways. Over the past few years, we ve seen social engineering grow to become a huge problem for businesses. Yet before people have really got to grips with it, a new attack vector is set to take over our attention as data breaches become the big problem businesses have to deal with. But businesses should love technology too. Although it s essential to have a training and educational response to fraud, without the right technological tools in place there s almost no chance of mounting a fightback. 18 So as fraudsters grow and evolve in their means, so should businesses. As this research has shown, they need to back their fraud managers with the right investment in AI, biometrics and ID verification. And they need to heed their call for a layered approach to combat a multifaceted problem. Within that is a huge opportunity to protect a business greatest asset in its people, and to become known as a trusted place, protected by a fraud fortress. Yes, fraud can be a human problem. But without the right technology, we leave our people incredibly vulnerable.

19 19

20 Isn t it time to find out how we can support your fraud prevention defenses? CALL +44 (0) OR VISIT transunion.co.uk/fraud-and-id twitter.com/transunionuk Copyright TransUnion. TransUnion Limited is authorised and regulated by the Financial Conduct Authority

Our digital future. SEPA online. Facilitating effective engagement. Enabling business excellence. Sharing environmental information

Our digital future. SEPA online. Facilitating effective engagement. Enabling business excellence. Sharing environmental information Our digital future SEPA online Facilitating effective engagement Sharing environmental information Enabling business excellence Foreword Dr David Pirie Executive Director Digital technologies are changing

More information

Ethics and technology

Ethics and technology Professional accountants the future: Ethics and technology International Ethics Standards Board for Accountants (IESBA) 19 June 2018 Agenda ACCA Professional Insights (PI) and technology Technology impact

More information

Our Corporate Strategy Digital

Our Corporate Strategy Digital Our Corporate Strategy Digital Proposed Content for Discussion 9 May 2016 CLASSIFIED IN CONFIDENCE INLAND REVENUE HIGHLY PROTECTED Draft v0.2a 1 Digital: Executive Summary What is our strategic digital

More information

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Notes from a seminar on Tackling Public Sector Fraud presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit

More information

In association with. A Finance Perspective on Storage Investments. Getting past No with your CFO

In association with. A Finance Perspective on Storage Investments. Getting past No with your CFO In association with A Finance Perspective on Storage Investments Getting past No with your CFO Freeform Dynamics, June 2017 Revisiting the stereotype Bean Counter image The traditional view of finance

More information

PwC s Global Economic Crime Survey 2018: UK findings

PwC s Global Economic Crime Survey 2018: UK findings PwC s Global Economic Crime Survey 2018: UK findings Pulling fraud out of the shadows www.pwc.co.uk/gecs Welcome to the UK results from our 2018 Global Economic Crime Survey (GECS). The findings from this

More information

Information & Communication Technology Strategy

Information & Communication Technology Strategy Information & Communication Technology Strategy 2012-18 Information & Communication Technology (ICT) 2 Our Vision To provide a contemporary and integrated technological environment, which sustains and

More information

DIGITAL ECONOMY BUSINESS SURVEY 2017

DIGITAL ECONOMY BUSINESS SURVEY 2017 hie.co.uk DIGITAL ECONOMY BUSINESS SURVEY 2017 Executive Summary Highlands and Islands: March 2018 INTRODUCTION In 2017, the Scottish Government, in partnership with HIE, Scottish Enterprise and Skills

More information

A Hybrid Risk Management Process for Interconnected Infrastructures

A Hybrid Risk Management Process for Interconnected Infrastructures A Hybrid Management Process for Interconnected Infrastructures Stefan Schauer Workshop on Novel Approaches in and Security Management for Critical Infrastructures Vienna, 19.09.2017 Contents Motivation

More information

8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector

8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector 8 Executive summary Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector The hectic demands of modern lifestyles, combined with the growing power of information technology,

More information

MIDEL SAFETY INSIDE. The MIDEL Transformer Risk Report

MIDEL SAFETY INSIDE. The MIDEL Transformer Risk Report The MIDEL Transformer Risk Report November 2018 1 Foreword Transformers are critical components of our energy infrastructure, keeping the lights on and the energy flowing in everything from our schools

More information

2017 CONSULTING COMMUNITY SURVEY FINDINGS

2017 CONSULTING COMMUNITY SURVEY FINDINGS DECEMBER 2017 2017 CONSULTING COMMUNITY SURVEY FINDINGS B 2 E C O N S U L T I N G ABOUT B2E CONSULTING With a community of over 20,000 high calibre independent consultants, B2E is a unique consultancy

More information

The Citizen View of Government Digital Transformation 2017 Findings

The Citizen View of Government Digital Transformation 2017 Findings WHITE PAPER The Citizen View of Government Digital Transformation 2017 Findings Delivering Transformation. Together. Shining a light on digital public services Digital technologies are fundamentally changing

More information

Worker Safety More Than Just a Radio

Worker Safety More Than Just a Radio HYTERA WHITE PAPER Worker Safety More Than Just a Radio WORKER SAFETY MORE THAN JUST A RADIO 1 Executive Summary The British workforce is woefully under-equipped for the modern workplace. That s the finding

More information

DIGITAL TRANSFORMATION LESSONS LEARNED FROM EARLY INITIATIVES

DIGITAL TRANSFORMATION LESSONS LEARNED FROM EARLY INITIATIVES DIGITAL TRANSFORMATION LESSONS LEARNED FROM EARLY INITIATIVES Produced by Sponsored by JUNE 2016 Contents Introduction.... 3 Key findings.... 4 1 Broad diversity of current projects and maturity levels

More information

IN A DIGITALLY DISRUPTED AGE DIGITAL PUBLIC SAFETY SUMMIT LONDON FEBRUARY 2017

IN A DIGITALLY DISRUPTED AGE DIGITAL PUBLIC SAFETY SUMMIT LONDON FEBRUARY 2017 PUBLIC SAFETY IN A DIGITALLY DISRUPTED AGE DIGITAL PUBLIC SAFETY SUMMIT LONDON FEBRUARY 2017 In February 2017, 60 public safety leaders, academics and industry thought leaders including senior representatives

More information

July PwC Irish 2017 Digital IQ Survey

July PwC Irish 2017 Digital IQ Survey July 17 PwC Irish 17 Digital IQ Survey PwC Irish 17 Digital IQ Survey Keeping pace with transformation PwC s tenth Global Digital IQ study highlights that while businesses around the world and in Ireland

More information

CCG 360 o Stakeholder Survey

CCG 360 o Stakeholder Survey July 2017 CCG 360 o Stakeholder Survey National report NHS England Publications Gateway Reference: 06878 Ipsos 16-072895-01 Version 1 Internal Use Only MORI This Terms work was and carried Conditions out

More information

INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016

INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 www.euipo.europa.eu INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 Executive Summary JUNE 2016 www.euipo.europa.eu INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 Commissioned to GfK Belgium by the European

More information

INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016

INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 www.euipo.europa.eu INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 Executive Summary JUNE 2016 www.euipo.europa.eu INTELLECTUAL PROPERTY (IP) SME SCOREBOARD 2016 Commissioned to GfK Belgium by the European

More information

LSCB Pan-Lancashire LSCB Online Safeguarding Strategy

LSCB Pan-Lancashire LSCB Online Safeguarding Strategy LSCB 3916 Pan-Lancashire LSCB Online Safeguarding Strategy 2017-2019 Table of Contents Foreword... 2 What is Online Safeguarding?... 3 Context... 3 What are the Risks?... 4 Our approach?... 5 Strategic

More information

Bridging law and technology

Bridging law and technology Bridging law and technology As law firms invest more in IT, how is new technology changing the role of the professional support lawyer? By Joanna Goodman in association with Thomson Reuters Law firms are

More information

Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) April 2016, Geneva

Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) April 2016, Geneva Introduction Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) 11-15 April 2016, Geneva Views of the International Committee of the Red Cross

More information

Engaging UK Climate Service Providers a series of workshops in November 2014

Engaging UK Climate Service Providers a series of workshops in November 2014 Engaging UK Climate Service Providers a series of workshops in November 2014 Belfast, London, Edinburgh and Cardiff Four workshops were held during November 2014 to engage organisations (providers, purveyors

More information

Total Situational Awareness (With No Blind Spots)

Total Situational Awareness (With No Blind Spots) Total Situational Awareness (With No Blind Spots) What is Situational Awareness? Situational awareness is a concept closely involved with physical security information management (PSIM, see other white

More information

Dealing with disruption: 16th Annual Global CEO Survey Key findings in the Banking and Capital Markets industry

Dealing with disruption: 16th Annual Global CEO Survey Key findings in the Banking and Capital Markets industry www.pwc.com/ceosurvey Dealing with disruption: 16th Annual Global CEO Survey Key findings in the Banking and Capital Markets industry Welcome Far-reaching changes are taking place, and they re taking place

More information

DEFENSIVE PUBLICATION IN FRANCE

DEFENSIVE PUBLICATION IN FRANCE DEFENSIVE PUBLICATION IN FRANCE A SURVEY ON THE USAGE OF THE IP STRATEGY DEFENSIVE PUBLICATION AUGUST 2012 Eva Gimello Spécialisée en droit de la Propriété Industrielle Université Paris XI Felix Coxwell

More information

Welcome to the future of energy

Welcome to the future of energy Welcome to the future of energy Sustainable Innovation Jobs The Energy Systems Catapult - why now? Our energy system is radically changing. The challenges of decarbonisation, an ageing infrastructure and

More information

Wombat Security s Beyond the Phish. Report. security technologies. #BeyondthePhish

Wombat Security s Beyond the Phish. Report. security technologies. #BeyondthePhish Wombat Security s 2016 Beyond the Phish Report security technologies #BeyondthePhish Beyond the Phish As our State of the Phish Report reinforced earlier this year phishing is still a large and growing

More information

Doing, supporting and using public health research. The Public Health England strategy for research, development and innovation

Doing, supporting and using public health research. The Public Health England strategy for research, development and innovation Doing, supporting and using public health research The Public Health England strategy for research, development and innovation Draft - for consultation only About Public Health England Public Health England

More information

Research Findings. Sopra Steria: 2015 Digital Trends Survey. Delivering Transformation. Together.

Research Findings. Sopra Steria: 2015 Digital Trends Survey. Delivering Transformation. Together. Research Findings Sopra Steria: 2015 Digital Trends Survey Delivering Transformation. Together. 2 Sopra Steria - 2015 Digital Trends Survey Sopra Steria: 2015 Digital Trends Survey Introduction The civil

More information

Engaging Industry Partners

Engaging Industry Partners Engaging Industry Partners What is Easy Access IP? Easy Access IP originated from University of Glasgow and is being used by a number of Universities around the world. All Intellectual Property (IP) made

More information

CCG 360 o stakeholder survey 2017/18

CCG 360 o stakeholder survey 2017/18 CCG 360 o stakeholder survey 2017/18 Case studies of high performing and improved CCGs 1 Contents 1 Background and key themes 2 3 4 5 6 East and North Hertfordshire CCG: Building on a strong internal foundation

More information

Computer Consultant Questionnaire

Computer Consultant Questionnaire Please respond to these questions to assist me in deciding if you will be our next computer consultant. Thank you, Mary Jones Small Biz, Inc. Response from Rescue Marketing Q1: How is your company different

More information

ZoneFox Augmented Intelligence (A.I.)

ZoneFox Augmented Intelligence (A.I.) WHITEPAPER ZoneFox Augmented Intelligence (A.I.) Empowering the Super-Human Element in Your Security Team Introduction In 1997 Gary Kasperov, the chess Grandmaster, was beaten by a computer. Deep Blue,

More information

Building DIGITAL TRUST People s Plan for Digital: A discussion paper

Building DIGITAL TRUST People s Plan for Digital: A discussion paper Building DIGITAL TRUST People s Plan for Digital: A discussion paper We want Britain to be the world s most advanced digital society. But that won t happen unless the digital world is a world of trust.

More information

2 LEADING IN THE NEW IN PUBLIC SAFETY

2 LEADING IN THE NEW IN PUBLIC SAFETY Disruption is creating a new operating environment for public safety agencies: new threats, a need to identify, risk and harm from volume, meet increasing citizen expectation, to create new ecosystems,

More information

Are your company and board ready for digital transformation?

Are your company and board ready for digital transformation? August 2017 Are your company and board ready for digital transformation? Going digital means change. Having the right skills is a critical part of the process. As overseers of company strategy, the board

More information

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016 Global Standards Symposium Security, privacy and trust in standardisation ICDPPC Chair John Edwards 24 October 2016 CANCUN DECLARATION At the OECD Ministerial Meeting on the Digital Economy in Cancun in

More information

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use: Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the

More information

OMCL Network of the Council of Europe GENERAL DOCUMENT

OMCL Network of the Council of Europe GENERAL DOCUMENT OMCL Network of the Council of Europe GENERAL DOCUMENT PA/PH/OMCL (09) 87 4R OMCL Network support for the implementation of the CoE MEDICRIME Convention Full document title and reference How the OMCL Network

More information

Digitisation Plan

Digitisation Plan Digitisation Plan 2016-2020 University of Sydney Library University of Sydney Library Digitisation Plan 2016-2020 Mission The University of Sydney Library Digitisation Plan 2016-20 sets out the aim and

More information

Cyberspace: The new international legal frontier

Cyberspace: The new international legal frontier Cyberspace: The new international legal frontier Keynote address to the Council of Europe Convention on Cybercrime 23 November 2011 CHECK AGAINST DELIVERY Acknowledgements Thorbjorn Jagland - Secretary

More information

Towards a Magna Carta for Data

Towards a Magna Carta for Data Towards a Magna Carta for Data Expert Opinion Piece: Engineering and Computer Science Committee February 2017 Expert Opinion Piece: Engineering and Computer Science Committee Context Big Data is a frontier

More information

Special Eurobarometer 460. Summary. Attitudes towards the impact of digitisation and automation on daily life

Special Eurobarometer 460. Summary. Attitudes towards the impact of digitisation and automation on daily life Summary Attitudes towards the impact of digitisation and automation on Survey requested by the European Commission, Directorate-General for Communications Networks, Content and Technology and co-ordinated

More information

21 st CEO Survey CEOs sound a note of optimism. Key findings from the oil and gas industry. ceosurvey.pwc

21 st CEO Survey CEOs sound a note of optimism. Key findings from the oil and gas industry. ceosurvey.pwc 21 st CEO Survey CEOs sound a note of optimism Key findings from the oil and gas industry ceosurvey.pwc 2 PwC s 21st CEO Survey: Key findings from the oil and gas industry Contents 5 7 9 X Positioned for

More information

Copyright: Conference website: Date deposited:

Copyright: Conference website: Date deposited: Coleman M, Ferguson A, Hanson G, Blythe PT. Deriving transport benefits from Big Data and the Internet of Things in Smart Cities. In: 12th Intelligent Transport Systems European Congress 2017. 2017, Strasbourg,

More information

THE AGILITY TRAP Global Executive Study into the State of Digital Transformation

THE AGILITY TRAP Global Executive Study into the State of Digital Transformation THE AGILITY TRAP 2016 Global Executive Study into the State of Digital Transformation Contents 04 The Transformation Journey Keeping pace with digital change 06 High Expectations Everywhere Customer expectation

More information

Presentation Outline

Presentation Outline Functional requirements for privacy enhancing systems Fred Carter Senior Policy & Technology Advisor Office of the Information & Privacy Commissioner / Ontario, Canada OECD Workshop on Digital Identity

More information

PRELIMINARY AGENDA. Europe s Largest Global Lending and Fintech Event October, 2017 InterContinental London The O2

PRELIMINARY AGENDA. Europe s Largest Global Lending and Fintech Event October, 2017 InterContinental London The O2 Europe s Largest Global Lending and Fintech Event $ $ 9-10 October, 2017 InterContinental London The O2 PRELIMINARY AGENDA lendit.com @lendit #lenditeurope TRACK AND SESSION DESCRIPTIONS* Below are some

More information

Roy Sandbach interview

Roy Sandbach interview Roy Sandbach interview Speaker key John RS Roy Sandbach Well, I have here with me Roy Sandbach, who s with Procter & Gamble, he works very much, and has worked for a long time in the area of innovation,

More information

Forensic Computing. Digital Evidence for Case Preparations

Forensic Computing. Digital Evidence for Case Preparations Forensic Computing Digital Evidence for Case Preparations In 1965 Gordon Moore wrote in Electronics Magazine 1 his theory on the potential for computational evolution increasing at a factored rate of double

More information

The Case for ISO27001:2013

The Case for ISO27001:2013 The Case for ISO27001:2013 Second edition ALAN CALDER Every possible effort has been made to ensure that the information contained in this book is accurate at the time of going to press, and the publisher

More information

Inside Track Research Note. in association with. and. Managing Software Exposure. Time to fully embed security into your application lifecycle

Inside Track Research Note. in association with. and. Managing Software Exposure. Time to fully embed security into your application lifecycle in association with and Managing Software Exposure Time to fully embed security into your application lifecycle Freeform Dynamics, 2018 Introduction About this Document The insights presented in this document

More information

Insights: Helping SMEs to access the energy industry

Insights: Helping SMEs to access the energy industry #COLLECTIVEFUTURE INSIGHTS: HELPING SMES TO ACCESS THE ENERGY INDUSTRY 1 #CollectiveFuture Insights: Helping SMEs to access the energy industry ENERGY INNOVATION CENTRE 2 #COLLECTIVEFUTURE INSIGHTS: HELPING

More information

Belfast Media Festival

Belfast Media Festival Belfast Media Festival 16 th November 2017 RTS Dan Gilbert Memorial Lecture Reimagining RTÉ for the Next Generation Dee Forbes, Director-General, RTÉ Thank you to the RTS and to the Belfast Media Festival

More information

Agents of Transformation. A new breed of technologists to shape our future. Nicolas Matelot

Agents of Transformation. A new breed of technologists to shape our future. Nicolas Matelot Research Report : Agents of Transformation A New Breed of Technologists to Shape Our Future appdynamics.com Nicolas Matelot DevOps Manager Groupe La Poste Agents of Transformation A new breed of technologists

More information

Ties That Bind. Organisational Security for Civil Society. Executive Summary

Ties That Bind. Organisational Security for Civil Society. Executive Summary Ties That Bind Organisational Security for Civil Society Executive Summary Prepared by The Engine Room for the Ford Foundation March 2018 1 This research report, commissioned by the Ford Foundation, was

More information

LAUNCH OF THE 2013 WORLD DISASTERS REPORT. 17 October 2013, Singapore. Remarks. Oliver Lacey-Hall

LAUNCH OF THE 2013 WORLD DISASTERS REPORT. 17 October 2013, Singapore. Remarks. Oliver Lacey-Hall LAUNCH OF THE 2013 WORLD DISASTERS REPORT 17 October 2013, Singapore Remarks Oliver Lacey-Hall Head - OCHA Regional Office for Asia and the Pacific Thank you very much for asking me to join this discussion.

More information

Countering Capability A Model Driven Approach

Countering Capability A Model Driven Approach Countering Capability A Model Driven Approach Robbie Forder, Douglas Sim Dstl Information Management Portsdown West Portsdown Hill Road Fareham PO17 6AD UNITED KINGDOM rforder@dstl.gov.uk, drsim@dstl.gov.uk

More information

International Forensic Services

International Forensic Services International Forensic Services Right People. Delivering Results. Experienced scientists delivering forensic effectiveness, unquestionable integrity, focused customer service and value for money. Strengthening

More information

DIGITAL INCLUSION STRATEGY

DIGITAL INCLUSION STRATEGY APPENDIX C South Cambridgeshire District Council DIGITAL INCLUSION STRATEGY 2015-2017 Printed and Published by: South Cambridgeshire District Council February 2015 Paper copies available upon request contact:

More information

INDUSTRY X.0 UNLOCKING THE POWER OF DIGITAL IN PLANT OPERATIONS

INDUSTRY X.0 UNLOCKING THE POWER OF DIGITAL IN PLANT OPERATIONS INDUSTRY X.0 UNLOCKING THE POWER OF DIGITAL IN PLANT OPERATIONS INTRODUCTION Operational excellence and efficient, reliable and safe production are always top of mind for chemical company executives. And

More information

CCG 360 stakeholder survey 2017/18 National report NHS England Publications Gateway Reference: 08192

CCG 360 stakeholder survey 2017/18 National report NHS England Publications Gateway Reference: 08192 CCG 360 stakeholder survey 2017/18 National report NHS England Publications Gateway Reference: 08192 CCG 360 stakeholder survey 2017/18 National report Version 1 PUBLIC 1 CCG 360 stakeholder survey 2017/18

More information

GENDER PAY GAP REPORT Gender Pay Report

GENDER PAY GAP REPORT Gender Pay Report 1 Gender Pay Report 2016-2017 2 INTRODUCTION John Hardie Chief Executive We re proud to be a diverse and inclusive place to work. We strive to be a place where all of our people can flourish, irrespective

More information

Keeping digital human: the challenges and opportunities of transforming UK s public services for a fully digital future

Keeping digital human: the challenges and opportunities of transforming UK s public services for a fully digital future Keeping digital human: the challenges and opportunities of transforming UK s public services for a fully digital future Authors Nathan Marsh Director, Digital Transformation Rebecca Mosedale Principal

More information

USING A GHOST-WRITER

USING A GHOST-WRITER USING A GHOST-WRITER Written by John Harman writingwa Inc 2008 Writing is hard work. The American playwright, Tennessee Williams, is reported as saying it was the hardest thing he ever did and he ought

More information

Technology in Corrections 1

Technology in Corrections 1 Technology in Corrections Tracey Mannix, Craig Osland, Ruth Turner and Nick Selisky Tracey Manix is Manager Security, John Morony Correctional Centre, Corrective Services NSW; Craig Osland is Security

More information

FOREST PRODUCTS: THE SHIFT TO DIGITAL ACCELERATES

FOREST PRODUCTS: THE SHIFT TO DIGITAL ACCELERATES FOREST PRODUCTS: THE SHIFT TO DIGITAL ACCELERATES INTRODUCTION While the digital revolution has transformed many industries, its impact on forest products companies has been relatively limited, as the

More information

THE CHEAPEST LEGAL WAY TO BUY GOLD IN AMERICA TODAY. Strategic Investor THE CHEAPEST LEGAL WAY TO BUY GOLD IN AMERICA TODAY

THE CHEAPEST LEGAL WAY TO BUY GOLD IN AMERICA TODAY. Strategic Investor THE CHEAPEST LEGAL WAY TO BUY GOLD IN AMERICA TODAY Strategic Investor THE CHEAPEST LEGAL WAY TO BUY GOLD IN AMERICA TODAY BY E.B. TUCKER, EDITOR, STRATEGIC INVESTOR Today, I m going to tell you about an incredible opportunity One no investor who has ever

More information

The 7 Habits of Highly Successful Investors

The 7 Habits of Highly Successful Investors The 7 Habits of Highly Successful Investors Over the years I ve got to hear the investment insights, secrets and tips from some of South Africa s best investors. Simply put: They do things differently

More information

Con Em If You Can was developed by the FINRA Investor Education Foundation in partnership with Commonwealth (formerly known as the D2D Fund).

Con Em If You Can was developed by the FINRA Investor Education Foundation in partnership with Commonwealth (formerly known as the D2D Fund). An Educator s Guide Brought to you by the FINRA Investor Education Foundation in partnership with Commonwealth Con Em If You Can is a Financial Entertainment video game that teaches players about the types

More information

50 Tough Interview Questions (Revised 2003)

50 Tough Interview Questions (Revised 2003) Page 1 of 15 You and Your Accomplishments 50 Tough Interview Questions (Revised 2003) 1. Tell me a little about yourself. Because this is often the opening question, be careful that you don t run off at

More information

Committee on the Internal Market and Consumer Protection. of the Committee on the Internal Market and Consumer Protection

Committee on the Internal Market and Consumer Protection. of the Committee on the Internal Market and Consumer Protection European Parliament 2014-2019 Committee on the Internal Market and Consumer Protection 2018/2088(INI) 7.12.2018 OPINION of the Committee on the Internal Market and Consumer Protection for the Committee

More information

BBC LEARNING ENGLISH 6 Minute English Will robots take our jobs?

BBC LEARNING ENGLISH 6 Minute English Will robots take our jobs? BBC LEARNING ENGLISH 6 Minute English Will robots take our jobs? NB: This is not a word-for-word transcript Hello and welcome to 6 Minute English. I'm and I'm. Hello. Hello there,. Now, what do you know

More information

THE VIRTUALISATION OF OBJECTS. Museums Australia Registrars Committee. Museums Australia 1996 National Conference.

THE VIRTUALISATION OF OBJECTS. Museums Australia Registrars Committee. Museums Australia 1996 National Conference. THE VIRTUALISATION OF OBJECTS Museums Australia Registrars Committee Museums Australia 1996 National Conference Powerhouse Museum 30th October 1996 1. INTRODUCTION Digital technology now makes it possible

More information

The Real Secret Of Making Passive Income By Using Internet At Your Spare Time!

The Real Secret Of Making Passive Income By Using Internet At Your Spare Time! Internet Marketing - Quick Starter Guide The Real Secret Of Making Passive Income By Using Internet At Your Spare Time! FILJUN TEJANO Table of Contents About the Author 2 Internet Marketing Tips For The

More information

"The future of Social Sciences and Humanities in Horizon 2020"

The future of Social Sciences and Humanities in Horizon 2020 SPEECH/11/741 Máire GEOGHEGAN-QUINN European Commissioner for Research, Innovation and Science "The future of Social Sciences and Humanities in Horizon 2020" Speech at the British Academy London - 10 November

More information

Privacy and Security in Europe Technology development and increasing pressure on the private sphere

Privacy and Security in Europe Technology development and increasing pressure on the private sphere Interview Meeting 2 nd CIPAST Training Workshop 17 21 June 2007 Procida, Italy Support Materials by Åse Kari Haugeto, The Norwegian Board of Technology Privacy and Security in Europe Technology development

More information

S&T Stakeholders Conference

S&T Stakeholders Conference S&T Stakeholders Conference The Way Ahead: Bodies Dr. Sharla Rausch Division Director uman Factors Division Science and Technology Directorate June 2-5, 2008 PARTNERING FOR A SAFER NATION uman Factors

More information

Children s rights in the digital environment: Challenges, tensions and opportunities

Children s rights in the digital environment: Challenges, tensions and opportunities Children s rights in the digital environment: Challenges, tensions and opportunities Presentation to the Conference on the Council of Europe Strategy for the Rights of the Child (2016-2021) Sofia, 6 April

More information

Personalised for: Rachel Parkes

Personalised for: Rachel Parkes Personalised for: Rachel Parkes 7 February 2018 Personalised for Rachel Parkes Personalised for: Rachel Parkes Contents The digitalisation interview: Murray Callander, chief technology officer, Eigen Publication

More information

LETTER FROM THE EXECUTIVE DIRECTOR FOREWORD BY JEFFREY KRAUSE

LETTER FROM THE EXECUTIVE DIRECTOR FOREWORD BY JEFFREY KRAUSE LETTER FROM THE EXECUTIVE DIRECTOR Automation is increasingly becoming part of our everyday lives, from self-adjusting thermostats to cars that parallel park themselves. 18 years ago, when Automation Alley

More information

How Explainability is Driving the Future of Artificial Intelligence. A Kyndi White Paper

How Explainability is Driving the Future of Artificial Intelligence. A Kyndi White Paper How Explainability is Driving the Future of Artificial Intelligence A Kyndi White Paper 2 The term black box has long been used in science and engineering to denote technology systems and devices that

More information

MORE POWER TO THE ENERGY AND UTILITIES BUSINESS, FROM AI.

MORE POWER TO THE ENERGY AND UTILITIES BUSINESS, FROM AI. MORE POWER TO THE ENERGY AND UTILITIES BUSINESS, FROM AI www.infosys.com/aimaturity The current utility business model is under pressure from multiple fronts customers, prices, competitors, regulators,

More information

Most of us will have heard of Open Data. Many of us are working to implement it.

Most of us will have heard of Open Data. Many of us are working to implement it. Most of us will have heard of Open Data. Many of us are working to implement it. New Zealand Police is well progressed on this journey. We have learned some things along the way that others who are also

More information

National Policing Improvement Agency. National Policing Improvement Agency Meeting the challenges of 21 st century crime and criminality

National Policing Improvement Agency. National Policing Improvement Agency Meeting the challenges of 21 st century crime and criminality National Policing Improvement Agency Meeting the challenges of 21 st century crime and criminality Michael Hallowes Detective Chief Superintendent Head of Strategic Operations National Policing Improvement

More information

Australian Census 2016 and Privacy Impact Assessment (PIA)

Australian Census 2016 and Privacy Impact Assessment (PIA) http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 12 February 2016 Mr David Kalisch Australian Statistician Australian Bureau of Statistics Locked Bag 10,

More information

Financial and Digital Inclusion

Financial and Digital Inclusion Financial and Digital Inclusion Equality and Education are Keys to Inclusion In order for a society to be open and inclusive, respondents across agree that fundamental access to education (91%) and equal

More information

Contact with the media

Contact with the media Contact with the media Support for survivors of sexual offences How we can help and about this guidance We are the Independent Press Standards Organisation (IPSO), the independent regulator of most of

More information

Quantum Technologies Public Dialogue Report Summary

Quantum Technologies Public Dialogue Report Summary Quantum Technologies Public Dialogue Report Summary Foreword Philip Nelson EPSRC Chief Executive New systems, devices and products that make use of the quantum properties of particles and atoms are beginning

More information

Fit for the future 17th Annual Global CEO Survey

Fit for the future 17th Annual Global CEO Survey www.pwc.com/ceosurvey Fit for the future 17th Annual Global CEO Survey Key findings in the asset management industry February 2014 Contents Page Sector snapshot 3 Confidence in growth 7 Preparing for a

More information

CRAFTING A RESEARCH PROPOSAL

CRAFTING A RESEARCH PROPOSAL CRAFTING A RESEARCH PROPOSAL Research proposals follow a set format. Proposal writing is its own genre, and just like you wouldn t write a short story and wait to introduce the main character until the

More information

DATA COLLECTION AND SOCIAL MEDIA INNOVATION OR CHALLENGE FOR HUMANITARIAN AID? EVENT REPORT. 15 May :00-21:00

DATA COLLECTION AND SOCIAL MEDIA INNOVATION OR CHALLENGE FOR HUMANITARIAN AID? EVENT REPORT. 15 May :00-21:00 DATA COLLECTION AND SOCIAL MEDIA INNOVATION OR CHALLENGE FOR HUMANITARIAN AID? EVENT REPORT Rue de la Loi 42, Brussels, Belgium 15 May 2017 18:00-21:00 JUNE 2017 PAGE 1 SUMMARY SUMMARY On 15 May 2017,

More information

A Field Guide to Exploring

A Field Guide to Exploring Empowered lives. Resilient nations. My Discover new approaches that UNDP and its partners are taking to achieve greater impact in complex environments. Empowered lives. Resilient nations. My UNDP BELIEVES

More information

Navigating The Fourth Industrial Revolution: Is All Change Good?

Navigating The Fourth Industrial Revolution: Is All Change Good? Navigating The Fourth Industrial Revolution: Is All Change Good? A REPORT BY THE ECONOMIST INTELLIGENCE UNIT, SPONSORED BY SALESFORCE Written by Forward In almost every aspect of society, the Fourth Industrial

More information

Orkney Electricity Network Reinforcement Stakeholder Consultation Response. August 2014

Orkney Electricity Network Reinforcement Stakeholder Consultation Response. August 2014 Orkney Electricity Network Reinforcement August 2014 Introduction In February 2014 Scottish and Southern Energy Power Distribution 1 (SSEPD) undertook a stakeholder consultation Connecting Orkney: Electricity

More information

Copernicus Evolution: Fostering Growth in the EO Downstream Services Sector

Copernicus Evolution: Fostering Growth in the EO Downstream Services Sector Copernicus Evolution: Fostering Growth in the EO Downstream Services Sector Summary: Copernicus is a European programme designed to meet the needs of the public sector for spacederived, geospatial information

More information

Emerging Security Challenges Division NATO

Emerging Security Challenges Division NATO NATO Science for Peace and Security (SPS) Programme Workshop on CBRN Defence 22-24 October 2013 Brussels Emerging Security Challenges Division NATO 1 NATO Science for Peace and Security (SPS) Programme

More information

COPYRIGHTED MATERIAL. Introduction. 1.1 Important Definitions

COPYRIGHTED MATERIAL. Introduction. 1.1 Important Definitions 1 Introduction In modern, complex telecommunications systems, quality is not something that can be added at the end of the development. Neither can quality be ensured just by design. Of course, designing

More information