The Institute for Critical Information Infrastructure Protection is an

Document Sample
The Institute for Critical Information Infrastructure Protection is an Powered By Docstoc
					The Institute for Critical Infrastructure Information Protection is a Center of Excellence and an
Organized Research Unit at the Marshall School of Business, University of Southern California
whose mission is to close the gap between the current corporate information security risk profile
and what is needed to protect our nation’s critical information infrastructure.

ICIIP’s strategy is to partner private sector businesses with government initiatives and agenda
while providing maximum insight and objectivity as an academic resource.

Our core activities include Research, Executive Education and Training, awareness development
through Executive Briefings and Standards and Best Practices development on Information
Security through a unique conceptual framework.

Conceptual Framework Overview

ICIIP’s unique conceptual framework considers the dynamic tensions between people, process,
technology and organization not just hardening the nodes of traditional security.

The following diagram represents any organizational entity and the key elements of its
information security system.



                                                     Organization
                                                        •Design
             Systemic                                   •Strategy
             Security
             Management

                                                     Governance

                            Culture                                           Architecture
                                                      Process



                                                                  En
                                                ce              Su ab
                                            g en                  pp lin
                                       er                            or g &
                                  Em                                   t
                   People                                                         Technology
                                       Human Factors
In February 2003, the White House released the National Strategy to Secure Cyber
Space. That document responded to national recognition of an urgent need for users,
operators, and vendors of networked data and communications systems across the
government and private sectors to work together to improve the security of the nation’s
information infrastructure. A product of collaboration among those key stakeholders, the
National Strategy charted a roadmap consistent with the Strategic Objectives of the
National Strategy for Homeland Security and include 1) Prevent cyber Attacks against
American’s Critical Information Infrastructures 2) Reduce national vulnerability to cyber
attacks and 3) minimize damage and recovery time from cyber attacks that do occur,
which map into the critical priorities for Cyber Space Security: 1) a national cyber
security response system; 2) a cyber security threat and vulnerability reduction program;
3) a cyber security and awareness training program; 4) a secure government cyber space;
and 5) international cyber security cooperation. For more detail, see
http://www.whitehouse.gov/pcipb/

In response to the need to protect the nation’s information infrastructure through public
private partnerships we have established five core activities: 1) Awareness 2) Executive
Education and Training 3) Research 4) Standards and Best Practices development and 5)
Technology Assessment to help accomplish our mission.

Creating an Information Security environment in such an eco-system requires dealing
with a multi-dimensional set of issues, involving the dynamic interaction between people,
process, technology and organization.

ICIIP’s model suggests that security is enhanced when there are not only secure systems
within these “nodes” but also when the dynamic interactions between nodes-- people,
emergent process, technology and organizations ---are in alignment within the
ecosystem. Therefore, system architecture must be designed and put in place,
incorporating many different disciplines, to effectively align and manage the layers of a
secure information infrastructure environment.

The diagram identifies six of these dynamics—governance, culture, architecture,
enablement, engagement and human factors—all of which need to be further understood
so that we can measure them and their relationships to each other in order to help those
who run our nation’s information networks manage risk in the rapidly changing
environment we compute in.

On the first node, Organization needs to design strategies that enable the enterprise to
compete effectively, create competitive advantages, understand its tolerance to risk and
adopt IT Governance policies that make Security a board level priority and pervasive
throughout the enterprise.
The second node: process, requires enterprises to develop and adhere to effective security
policies and procedures that specify what network administrators and the users they
support should do to keep their networks secure. Such processes should involve and be
tailored to all levels within an organization, up to the executive C-suite.

Technology developed and implemented to protect information systems needs to stay
ahead of technology developed to exploit and corrupt those systems. This involves not
only hardening the node but improving the architecture and improving collaboration
between vendors and users in determining optimal security settings for users’ needs.

Finally, the people, i.e. users in an enterprise need to practice fundamental cyber security
“hygiene” and, in more complex enterprise systems, receive training for securing
enterprise data and communications. Further, enterprises need to understand the Human
Factors involved and how they affect their security efforts.

ICIIP believes that to be effective in protecting their information infrastructure,
enterprises need to take a Systemic Security Management approach to Information
Security (SSM). The SSM approach ensures that an enterprise does not just buy security
but truly buys into it, and just like Total Quality Management and Customer Service, the
result will be “security that pays for itself”. See the SSM continuum enclosed as an
attachment to this document.

This approach begins with a C Suite "top down" vision of how important it is for
companies to be "unconsciously competent" in the way they manage their information
security and the way they address these Human Factors so that it is pervasive throughout
the culture of the organization.

Due to the many sources of complexity of software, applications, always on connectivity
and IP everywhere, and the complexity of the protection array, the nation’s critical
information infrastructures are seriously at risk from a wide range of very significant
potential threats. All of these infrastructures (transportation, finance, electric power,
water, etc.) are increasingly dependent on the evolving information infrastructure – the
public telephone network, the Internet, terrestrial and satellite wireless networks,
computers and communications. The internet and telephone networks act as its
backbone. Consequently, the threats to the existing cyber infrastructures are themselves
threats to the national information infrastructures. Both short term and long term
remedies are needed, with strategies for providing increasing measures of security not
only to the ‘nodes’ of information security. ICIIP, along with it’s founding members,
solutions partners, research partners and alliance partners work together to find, develop
and create solutions that will address these important vulnerabilities and threats within
our information ecosystems.
Our research indicates that it is decidedly more importantly to understand and manage
connectivity points or ‘tensions’ between the nodes which ultimately determines the
success of information security and our ability to prevent, detect and mitigate/respond to
information attacks.

Research Overview

ICIIP provides research opportunities to our industry partners. Our research activities include
several white papers for the Department of Homeland Security by a number of our research
affiliates including:

    •   “Human Issues in Secure Cross-Enterprise Collaborative Knowledge-Sharing” by Ann
        Majchrzak
            – The Paradox of Sharing and Protecting Knowledge in Cross-Organization
                Knowledge-Sharing: How can Intelligent Agents Help?
    •   “Identity Management Systems: Security Challenges and Business Value Opportunities”
        By Dr. Omar El Sawy et al
    •   “Reengineering Security” led by Professor Dan O’Leary
    •    “Vulnerability Management for Enterprises: The Impact of Ethical Orientation of
        Enterprises on their Ability to Manage Crisis” led by Professor Ian Mitroff.

Research Affiliates

Through our Founding Member, The Aerospace Corporation, we have over 1,000 PHD research
engineers available to us through their Engineering and Technology Group with specialties that
include: Reconnaissance and Systems, Electronic Systems, Computer Systems, Vehicle Systems,
Systems Engineering, Laboratory Operations. In partnership with Aerospace, we conducted
research on “The State of the Art in Multi-Biometrics and the Readiness Level of Technology”.

Our research affiliates also include the following list of university Professors:

Ann Majchrzak

(213) 740-1633
majchrza@usc.edu

Areas of Expertise

- Information Systems & Infrastructure
- IS Strategy & Deployment
- Virtual Team
- Knowledge Management

Department:
Information & Operations Management
Title:
Professor, Information Systems

Degrees:
Ph.D., University of California,Los Angeles

Biography:
Ann Majchrzak specializes in the design and management of technology change. Her focus is on
optimizing the synergy between computer-based technology, human capabilities, organizational
structure, and strategic needs. Working in this field since 1980, she has developed tools to help
technology and organizational designers, including HITOP, HITOP-A, ACTION, TOP-
Integrator, and TOP-Modeler. Her tools have been used in Europe, Australia, and South and
North America by companies including Hewlett-Packard, General Motors, Texas Instruments,
Hughes, and Digital Equipment Corporation.

Publications:
Majchrzak, A., Cooper, L. and Neece, O. 'Knowledge Reuse for Innovation.' Management
Science 50 (2) (2004): 174-188. Majchrzak, A. and Zhong, J. 'An Exploration of Impact of
Cognitive Elaboration on Learning in ISD Projects.' Information and Technology Management 5
(1/2) (2004): 143-160. Majchrzak, A. 'TOP Modeler.' Chapter in Handbook of Human Factors
and Ergonomics Methods. Edited by H. Hendricks. Majchrzak, A. 'HITOP Analysis.' Chapter in
Handbook of Human Factors and Ergonomics Methods. Edited by H. Hendricks. Majchrzak, A.,
Cooper, L. and Neece, O. 'Knowledge in the Radical Innovation Process at JPL.' Chapter in
Knowledge Management Technologies and Applications at NASA. Edited by J. Holm and J.
Liebowitz. Majchrzak, A. and El Sawy, O. 'Critical Issues in Research on Real-Time Knowledge
Management in Enterprises.' Journal of Knowledge Management 8 (4) (2004). Majchrzak, A. and
Malhotra, A. 'Enabling Knowledge Creation in Far-Flung Teams: Best Practices for IT Support
and Knowledge Sharing.' Journal of Knowledge Management 8 (3) (2004). Majchrzak, A. and
Beath, C. 'A Framework for Studying the Process of Implementing Web-Based Learning
Systems.' Chapter in A State of the Art Assessment for Web- Based Learning. Edited by H.
O?Neil and R. Perez. Majchrzak, A., Chellappa, R. K. and Cooper, L. P. 'Personalizing
Knowledge Delivery Services: A Conceptual Framework.' In New Frontiers in Knowledge
Management. Edited by K. C. Desouza. UK: Palgrave Mcmillian. Forthcoming. Majchrzak, A.
'An Overview of Computer-Mediated Inter-Organizational Knowledge- Sharing: Insights from a
Virtual Team Innovating Using a Collaborative Tool.' In Encyclopedia of Information Science
and Technology. Edited by M. Khosrow-Pour. Idea Group Publishing. Majchrzak, A., Beath, C.,
Lim, R.



Arvind Bhambri

(213) 740-1633
bhambri@marshall.usc.edu

Areas of Expertise
- Global Strategic Management
- New Executive Transitions
- Strategic Change
- Global Business Strategy
- Competitive Advantage

Department:
Management & Organization

Title:
Associate Professor

Degrees:
DBA, MBA, Harvard; Indian Institute of Management, Calcutta

Biography:
Arvind Bhambri specializes in strategic management and organizational processes. He has
worked in the U.S., India, China, and Japan with corporate senior management teams to
implement strategic change. His research focuses on effectiveness of new executives, change
agents, industry and enterprise transformation, and stakeholder relationships. He is an editorial
board member of the Strategic Management Journal.

Publications:
Bhambri, A., Cummings, T. and Greiner, L. 'Searching for a Strategy to Teach Strategy.'
Academy of Management Learning & Education 2, no. 4 (December 2003). Bhambri, A.,
Greiner, L. and Poulfelt, F. 'The Changing Global Consulting Industry.' The Contemporary
Consultant. Edited by L. Greiner and F. Poulfelt. Mason, OH: Thomson Southwestern, 2004.
Bhambri, A., Cummings, T. and Greiner, L. 'When New CEOs Succeed and Fail: 4-D Theory of
Strategic Transformation.'Organizational Dynamics (Spring 2003).

Ashish Soni (bio to be provided)

Christoph Langdon (bio to be provided)

Daniel O' Leary

(213) 740-1633
oleary@usc.edu

Areas of Expertise

- Information Systems & Infrastructure
- Artificial Intelligence
- Enterprise Resource Planning (ERP)
- Supply Chain Management
- Knowledge Management
Department:
Leventhal School of Accounting

Title:
Professor

Degrees:
Ph.D., Case Western Reserve University

Biography:
Daniel E. O'Leary specializes in artificial intelligence; decision making; expert systems; and
information systems. He has been a government consultant on artificial intelligence in business.
He has also been a management consultant in information systems and vice president of finance
and computer operations for a national advertising agency. He is editor of International Journal of
Intelligent Systems in Accounting, Finance and Management. He is Certified Public Accountant;
Certified Management Accountant; Certified Information Systems Auditor; and holds a
Certificate Ill Data I IL.

Publications:
O?Leary, D. 'Enterprise Resource Planning (ERP) Systems: An Empirical Analysis of Benefits.'
The Journal of the Artificial Intelligence and Emerging Technologies (AAA) 1 (2003). O?Leary,
D. 'Auditor Environmental Assessments.' International Journal of Accounting Information
Systems 4 (2003). O?Leary, D. 'On the Relationship Between REA and SAP.' International
Journal of Accounting Information Systems 5 (1) (2004): 65-81. O?Leary, D. 'ABB Industries:
Implementing SAP?s ABC.' The Journal of the Artificial Intelligence and Emerging Technologies
(AAA) . Forthcoming. O?Leary, D.'?The Impact of Manager Philosophy on Knowledge
Management Systems.' Decision Support Systems. Forthcoming. O?Leary, D. Enterprise
Resource Planning Systems. Cambridge University Press. Russian Version.

Dave Yates (bio to be provided)

Francis Pereira

(213) 740-1633
fpereira@marshall.usc.edu

Areas of Expertise

- Telecom Management
- Wireless and Emergent E-Markets
- SMEs and Networked Products and Services
- Global Markets; Asia-Pacific, Korea
- Networks, Regulation, and Standardization

Department:
Information & Operations Management
Title:
Assistant Professor

Degrees:
Ph.D., University of Southern California

Biography:
Francis Pereira specializes telecommunications, particularly in E-Commerce, wireless mobility
and emergent technologies. He is a principle researcher for the Center for Telecom Management
and contributes to the annual Telecom Outlook Report, a comprehensive industry analysis of
telecom markets. He has a background in political economics and public policy, and he teaches
economics and statistics. His research includes trade and financial flows in the Association of
South-East Asian Nations.

Publications:
Pereira, F. and Fife, E. 'Diffusion of Mobile Data Applications.' Journal of Communications
Network 2 (3) (2003). Pereira, F., Fife, E. and Hall. P. Managing Electronic Commerce.
Forthcoming.



Ian Mitroff

(213) 740-1633
ianmitroff@earthlink.net

Areas of Expertise

- Leadership
- Moral and Ethical Work Environments
- Strategic Change and Planning
- Governance, Corporate Responsibility & Emotion Intelligence

Department:
Management & Organization

Title:
Professor

Degrees:
Ph.D, M.S., B.A., University of California, Berkeley

Biography:
Ian Mitroff is regarded as the founder of the discipline of crisis management. He was director of
the former USC Center for Crisis Management for 10 years. He has consulted and published more
than 250 articles and 23 books on crisis management and critical thinking. He also specializes in
crisis prevention, strategic planning, and the design of moral/ethical work environments.

Publications:
Mitroff, I.'?Do Not Promise Religion Under the Guise of Spirituality.' Organization 10 (2): 375-
382. Mitroff, I. and Alpaslan, M.'Preparing for Evil.' The Harvard Business Review (April 2003):
109-115. Mitroff, I. 'Spiritual IQ: The Farthest Reaches of Human Development.' World Futures
59: 485-494. Mitroff, I. 'Systems Thinking?s Challenges to Research in Spirituality and Religion
at Work: An Interview with Ian Mitroff.' Journal of Organizational Change Management 2.
Mitroff, I., Alpaslan, M. and Green, S. 'Crises as Ill-Structured Messes.' International Studies
Review 6 (2004): 175-182. Mitroff, I.'William James, CEO.' International Technology. Mitroff, I.
'Business Not As Usual: Reflections on Spirituality in the Workplace.' In Business, Religion, and
Spirituality, edited by Oliver Williams. University of Notre Dame Press, 2003: 187-200.

Appointments:
The Harold Quinton Professor in Business Policy.

Honors:
Director, USC Annenberg Strategic Public Relations Center Professor of Journalism, The
Annenberg School of Communication Founder, USC Center for Crisis Management.

Kevin Kobelsky (bio to be provided)

Milind Tambe (bio to be provided)

Morley Winograd

(213) 740-1633
winograd@marshall.usc.edu

Areas of Expertise

- Information Systems & Infrastructure
- E-Government, Budgets, Taxation, & Welfare
- Strategic Planning Process
- Wireless Networks, Regulation, Standardization
- Corporate Culture & Total Quality Management

Department:
Management & Organization

Title:
Associate Professor of Clinical

Biography:
Morley Winograd specializes in the application of business practices to public policy. He was
Senior Policy Advisor to Vice President Al Gore between 1997-2001, running the Reinventing
Government initiative. The book he co-authored, Taking Control: Politics in the Information Age,
focuses on the intersection of politics and business.

Publications:
'Public Sector Consulting,' co-authored with Alan Glassman, Handbook of Management
Consulting, The Contemporary Consultant, edited by Larry Greiner.

Appointments:
Director, Center for Telecom Management.



Omar El Sawy

(213) 740-1633
elsawy@marshall.usc.edu

Areas of Expertise

- Operations
- Global E-Business & Supply Chains
- Information Systems & Infrastructure
- Convergent Networks

Department:
Information & Operations Management

Title:
Professor

Degrees:
Ph.D., Stanford Business School

Biography:
Omar A. El Sawy specializes in redesigning electronic value chains; collaborative integration and
business process redesign in e-business; and knowledge management and vigilance in fast-
response environments. As Director of Research at the Center for Telecom Management CTM, he
leads an industry-sponsored research program that focuses on critical infrastructure management,
e-business collaborative integration, and wireless mobility. Prior to heading CTM, his research
projects were sponsored by the RosettaNet Consortium and by Carnegie-Mellon University.

Publications:
El Sawy, O. A., Donegan, C., Gray, P., Houghton, B. and Joshi, A. 'Vigilant Information Systems
for Managing Enterprises in Dynamic Supply Chains: Real-Time Dashboards at Western Digital.'
MIS Quarterly Executive (December 2003). El Sawy, O. A., Chehade, F., Gosain, S. and
Malhotra, A. 'The Impact of Common e- Business Interfaces.' Communications of the ACM
(December 2003). El Sawy, O. A. 'The 3 Faces of IS Identity: Connection, Immersion, and
Infusion.' Communications of the AIS 12 (November 2003). El Sawy, O. A. and Sarkar, M. 'The
Four Tigers of Global e-Business Infrastructure: Strategies and Implications for Emerging
Economies.' Communications of the AIS 12 (June 2003). El Sawy, O. A., Gosain, S. and
Malhotra, A. 'Coordinating for Flexibility in e-Business Supply Chains.' Journal of Management
Information Systems (Winter 2004). Forthcoming. El Sawy, O. A., Walls, J. and Widmeyer, G.
'Assessing Information System Design Theory in Perspective: How Useful Was Our 1992
Rendition?' Journal of Information Technology Theory and Application (2004). El Sawy, O. A.
and Majchrzak, A. 'Critical Issues in Research on Real-Time Knowledge Management in
Enterprises.' Journal of Knowledge Management 8 (4) (2004).

Appointments:
Director of Research, Center for Telecom Management.

Honors:
Associate Editor and Member of Editorial Board: Information Systems Research, Journal of
Strategic Information Systems, Information Systems and e-Business, Journal of Organizational
Computing and e-Commerce, Communications of the Association for Information Systems.

Paul Pahlov (bio to be provided)

Ramnath Chellappa

(213) 740-1633
ramnath.chellappa@marshall.usc.edu

Areas of Expertise

- Information Management
- Digital Products
- Electronic Markets and Intermediaries
- E-Security and E-Privacy
- Personalization

Department:
Information & Operations Management

Title:
Assistant Professor

Degrees:
Ph.D., University of Texas, Austin

Biography:
Ramnath Chellappa specializes in e-business, internet security, privacy and information
technology-related strategies. He has an engineering background and worked as a UNIX systems
analyst.

Publications:
Chellappa, R. K. and Shivendu, S. 'A Model of Advertiser-Portal Contracts: Personalization
Strategies under Privacy Concerns.' Information Technology and Management 7 (1).
Forthcoming. Chellappa, R. K. and Shivendu, S. 'Economics of Technology Standards:
Implications for Movie Piracy in a Global Context.' Journal of Management Information Systems
20 (2) (Fall 2003): 137-168. Chellappa, R. K. and Kumar, R. 'Examining the Role of 'Free'
Product Augmenting Online Services in Pricing and Customer Retention Strategies.' Journal of
Management Information Systems. Forthcoming. Chellappa, R. K. and Kumar, R. K. 'On the
Impact of Operational Costs and Changing Consumer Expectations in Designing Web-based
Retail Stores.' Journal of Management Information Systems. Chellappa, R. K., Cooper, L. P. and
Majchrzak, A. 'Personalizing Knowledge Delivery Services: A Conceptual Framework.' In New
Frontiers in Knowledge Management . Edited by K. C. Desouza. UK: Palgrave Mcmillian.
Forthcoming.

Richard Bergin (bio to be provided)

Terri Benzel (see also Lecturer)

Terri Grifith (bio to be provided)

Executive Education and Training Program Overview

ICIIP has established a design to provide participants with practical techniques
for protecting the security of an organization's information assets and resources with US/CERT.
Security issues, technologies, and recommended practices are addressed at increasing layers of
complexity, beginning with concepts and proceeding on to technical implementations.

We have also developed a program for Leading Systemic Security Management based on the
concept that “Systemic Security Management” is the responsibility of everyone in an enterprise,
not just the IT management, and that there are a series of factors that must be taken into account
over and above the key elements of - Organization, People, Process and Technology. And that, in
fact, the interactions between and among these four elements, are what create a high quality
Systemic Security Management environment, all leading to our proposition that successful
implementation results in “Security that Pays for Itself”.

Security that Pays for Itself – means that:

       High levels of security can be considered, and are in fact, a vehicle for competitive
        advantage for the enterprise.
       The cost of security can be spread out across the entire employee base of an enterprise
        with almost negligible incremental cost as opposed to solely focusing ever-increasing
        resources on IT infrastructure and support groups.
       Viewing security holistically as a means of relatively inexpensive proactive planning, is
        far wiser, and ultimately much more economical, than the cost of recovery from
        successful cyber attacks.
       Continuous, spontaneously generated internal measurement and assessment of security
        precautions is far superior than management generated dictates demanding compliance,
        which often prove to be not only costly, but are likely to be ignored.

The process of implementing and achieving Systemic Security Management starts with an
internal assessment of the Five Levels of Security, which again looks at Organization, People,
Process and Technology categorized by five levels of competency (again, see attached
continuum):

Level 1 – Functional Focus

Level 2 – Integration Focus

Level 3 – Communication Focus

Level 4 – Commitment Focus

Level 5 – Systemic Implementation

Once this assessment is completed, in essence a baseline is established for the “this is where we
think we are” part, while the fifth level of competency provides a “Desired Future” that the
ultimate plan is designed to create.

Closing this gap will lead to Systemic Security Management and must be done by focusing on the
dynamic tensions that exist between the four core elements of the challenge--Organization,
People, Process and Technology.

These tensions form the basis for the tutorials in the program, as follows:

       Governance - The relationship between process and organization

        Risk Management

       Architecture - The relationship between organization and technology

        Best Practices/controls/policies

       Enablement - The relationship between technology and process

        People Using Technology Effectively

       Engagement - The relationship between technology and people
        User Interface to Technology

       Culture - The relationship between people and organization

        Crisis Prone vs. Crisis Prepared

       Emergence - The relationship between process and people

        Process Use Leading to Process Change

Given an understanding of the baseline of “where we are now” and the factors that can influence
Systemic Security Management implementation, the program participants will be armed with the
ability to create their vision of the future and “predict the future by inventing it”.

LSSM Program Description Summary

The LSSM program is designed to be four days long, starting with a Sunday brunch during which
the participants will be engaged in an interactive conversation about their personal experiences
and their hopes, dreams, and fears about the future.

They will then be asked to assess their own organization based on the Five Levels of Security
matrix, then tutored on the art and benefits of journaling, a process they will use throughout the
course to capture and focus their own individual plans.

They will be given a chance to begin their journal after an in depth tutorial on the “Walk the Cat
Backwards” process and ICIIP’s Security Challenge Pyramid.

The following days will include six, half-day tutorials regarding each of the tensions described
above, followed by a journaling session to help the participants capture their thoughts on their
view of the future and the steps necessary to get there as it relates to the tensions/relationships.

At the end of the program, all participants will be asked to gather their thoughts about everything
that has been said into a letter to themselves which could be roughly described as their own
personal “Vivid Description of the Desired Future” and then write a letter to themselves
describing what they are going to do when they get “back home” to implement what they have
learned. A list of lecturers can be found in the appendix.

LSSM Potential Program Lecturers

Andrea Hoy received her initiation into the information security community when her hard work
and dedication earned her the role of Assistant Venue Manager/Supervisor at the 1984 Summer
Olympics in Los Angeles, California. This position exposed her to the information security field
and ignited a passion that has made Andrea, arguably, one of the leading women in her
profession. She has not only served as an advisor to the Pentagon, but in 1991 Andrea received
the Security Education Manager's Award, presented to her by a representative from the Pentagon,
acknowledging her work in applying Continuous Process Improvements to the implementation of
information security resulting in cost savings for both industry and Government. She has been
involved in numerous committees in Washington, D.C., to establish national and international
information security policies. She has written, spoken on, assisted with, and helped companies
establish policies and procedures that comply with the European Union Privacy Directive, the
Data Protection Act of 1998, and the Wet Bescherming Persoonsgegevens (WBP) Dutch Personal
Data Protection Act of 2000.

Andrea is CEO of A. Hoy & Associates, a thriving information security consulting firm that was
established to provide essential information security expertise on immediate and specific
information security. The services provided range from a quick policy review to wireless
vulnerability risk assessments, computer forensics/investigations, senior management briefings,
and assisting with developing a total information security strategic plan customized to the specific
company culture quickly and efficiently with the utmost discretion.

As the President of Tysak, the security division of a leading international information technology
education company, Andrea excels at education. She can often be found at speaking engagements
throughout the nation to promote awareness of vulnerabilities and trends in the IT security field.
She has been consulted on current information security issues in various newspapers and
publications with speaking engagements and radio interviews on such topics as Hacktivism,
Script Kiddies, Email Content Management, Email Relay, PDA Vulnerabilities, and Privacy and
Computer Forensics. Andrea’s commitment to education has driven her to create a nationwide
“Chief Information Security Officer (CISO) Bootcamp,” through her affiliation with Tysak,
which addresses best practices of security management.

At the apex of her 15 plus years in the information security field, she has the distinction of being
the first Chief Information Security Director and Data Privacy Officer for Fluor Daniel, a $12
billion dollar Fortune 200 company. In addition to this, she has helped provide strategic direction
in information security and business continuity to such companies as Rockwell International,
Boeing, McDonnell Douglas, Litton, and Pacific Life.

Andrea serves as President of the Orange County Chapter of the Information Systems Security
Association (ISSA), an international association for information security professionals, where she
has successfully tripled the membership in the last two years. She presently sits on the new CISO
Executive Forum Task Force. This forum was established to bring together ISSA members that
are CISOs, to give them an opportunity to network, share ideas, and improve upon their skills in
this executive role.

She served on the Technical Advisory Board for RSA for 4 years and advised the International
Board of Directors for PointSec / ProtectData of Sweden. She presently sits on the Board of
Advisors for Encentuate, a global security identity management and provisioning company.

Andrea received a Masters of Business Administration from Pepperdine University in Malibu,
California. Prior to that, she graduated Magna Cum Laude and entered into the honor society of
Beta Gamma Sigma (the Phi Beta Kappa of the School of Business).
Bill Belgard first gained experience in organizational development during his tenure in the Navy.
He applied that experience to his work at Tektonix, where he participated in a major, successful
organizational transformation. Having seen change initiatives both realized and botched, Bill set
out to form his own company. Through work with diverse firms, including Shell, Boeing, AT&T,
Motorola, and Quaker Oats, Bill gained a broad perspective on the change process. His
innovative processes help companies clarify strategy, redesign business processes, and create
empowered leaders and teams, sustaining corporate performance and improvement. Bill and his
strategic partners have now created The American Center for Strategic Transformation, designed
to provide an academic environment that allows the free exchange of ideas and the formulation of
strategy that can be taken to action to produce results. The Center provides thought leadership,
process and focus to industry and government round tables, work groups and study teams. For
more information, visit www.strategictransformation

William C. Boni has spent his entire professional career as an information protection specialist
and has assisted major organization’s in both the public and private sectors. For more than 25
years he has helped a variety of organizations design and implement cost-effective programs to
protect both tangible and intangible assets. In a wide range of assignments Bill has assisted
clients in safeguarding their digital assets, especially their key intellectual property, against the
many threats arising from the global Internet. In addition, he has pioneered the innovative
application of emerging technologies including computer forensics, intrusion detection and
others, to deal with incidents directed against electronic business systems.

Bill has served as a consultant in several professional service organizations and now works as the
Vice President and Chief Information Security Officer of Motorola Information Protection
Services. He is responsible for the company's overall program to protect critical digital
proprietary information, intellectual property and trade secrets. He also directs the people,
processes and technology programs that safeguard the company's global network, computer
systems and electronic business initiatives.

Often quoted by leading print publications such as the Wall Street Journal, US News & World
Report the Financial Times, LA Times, and CIO Magazine, Bill has also appeared on many
network broadcasts including Prime Time Live, CNN and CNN/fn discussing espionage and
cyber crimes directed against American high technology corporations. Other assignments in his
distinguished career include work as a U.S. Army counter-intelligence officer; Federal agent and
investigator; investigator and security consultant; Vice President of Information Security for First
Interstate Bank; and project security officer for “Star Wars” programs and other defense work
with Hughes Aircraft Company and Rockwell.

He is the past chairman of the American Society of Industrial Security (ASIS) Council on
Safeguarding Proprietary Information http://www.asisonline.org/safeguarding.html and he co-
authored both the 1999 and 2001ASIS-PwC report on "Loss of Proprietary Information". He
chaired the 1999 Information Systems Audit and Control Association annual conference on
Computer Audit and Security. Bill is on the Board of Directors of the International Society for
Policing Cyberspace (http://www.polcyb.org) and served as an industry delegate to the National
Cyber crime Training Partnership (NCTP) and to the G-8 Cyber crime Task Force, both
sponsored by the U.S. Department of Justice. He is a member of the Board for the Certified
Information Security Manager’s certification sponsored by ISACA.
In July 2003 he received a CSO “Compass Award” from the publisher’s of CSO magazine
recognizing him as one of a handful of thought leader’s who “helped build security culture not
just in their own organization but in the broader business community and the nation.” Mr. Boni
has also recently been appointed to the 2003/2004 Board of the Computing Technology Industry
Association http://comptia.org/

He holds the Certified Information Systems Auditor (CISA) from ISACA and the Certified
Protection Professional (CPP) from ASIS International.

Bill is co-author of “I-Way Robbery: Crime on the Internet”, and “High Tech Investigator’s
Handbook: Working in the Global Environment" published by Butterworth-Heinemann
(www.bh.com) in 1999. His most recent book "Netspionage: The Global Threat to Information"
was released in September 2000.

Dave Cullinane is the Chief Information Security Officer (CISO) for Washington Mutual, Inc. -
one of the largest banks in the United States. In that capacity, he is responsible for developing
and sustaining an information security program that effectively protects the personal information
of millions of Washington Mutual customers.

Prior to joining Washington Mutual, Mr. Cullinane was a Senior Consultant for nCipher, Inc.; the
Director of Information Security for Sun Life of Canada's U.S. operations and helped create
Digital Equipment Corporation's Security Consulting Practice. He has more than 20 years of
security experience and is Board Certified in Security Management by ASIS International as a
Certified Protection Professional (CPP).

He is also a Certified Information Systems Security Professional (CISSP) and a former Certified
Business Continuity Professional (CBCP). Dave is also the International President of the
Information Systems Security Association (ISSA). With active participation from individuals and
chapters all over the world, the ISSA is the largest international, not-for-profit association for
security professionals. It provides educational forums, information resources and peer interaction
opportunities that enhance the knowledge, skill and professional growth of its members.

He is also a Charter Member of the Global Council of Chief Security Officers, a group of
influential senior cyber-security leaders dedicated to enhancing cyber security. The Council
brings together expertise from academic, corporate and government backgrounds to form a think
tank to encourage dialogue and action that will meet the new challenges of information security.
The Council's ten charter members are: Howard A Schmidt of eBay, Bill Boni of Motorola,
Vinton Cerf of MCI, Scott Charney of Microsoft, Mr. Cullinane of Washington Mutual, Mary
Ann Davidson of Oracle, Whitfield Diffie of Sun Microsystems, Steve Katz formerly of
Citigroup, Rhonda MacLean of Bank of America, and Will Pelgrin of the New York State Office
of Cyber Security and Critical Infrastructure.

Mr. Cullinane also serves on ASIS International's Information Technology Security Committee
(ITSC) and is on the Editorial Advisory Board of CSO Magazine and SecurityTechnology &
Design Magazine.
Dr. Edy Greenblatt is currently President of Execu-care Coaching & Consulting. She was
previously Research Assistant Professor of Management and Organization at the University of
Southern California Marshall School of Business’ Center for Effective Organizations. Dr.
Greenblatt’s research focuses on enhancing performance and preventing burnout through
individual, team and organizational-level strategic choices. More broadly, her Human Resource
Management and Organizational Behavior work address the relationships between intrusive
technologies, personal boundaries, personal resources, job satisfaction, wellness, involuntary
turnover and organizational performance. Prior studies and consulting engagements have
examined environmental conditions that affect team effectiveness and the organizational
manifestations of individual and organizational culture.

Dr. Greenblatt has been active in research, consulting, teaching and coaching for a variety of
organizations and individuals in real estate, leisure, health, education, law, art,
telecommunications, travel and entertainment. She also happens to be the world authority on
using flying trapeze for organizational development and human resource enhancement.

Edy has authored or co-authored ten articles, books and instructional videotapes. She is currently
completed a book, Surviving Occupational Paradise: Depletion, Restoration and Emotional
Labor in a Total Institution.

Dr. Greenblatt is the recipient of numerous research grants and awards and has been a National
Science Foundation Fellow Honoree. She is a member of the Alliance for Strategy Leadership
(A4SL), the Academy of Management, and the American Psychological Association. She has
lectured at, directed and produced many conferences and seminar events for scholars and
practitioners.

Edy holds a B.A. in World Arts and Cultures and an M.A. in Dance Ethnology from the
University of California at Los Angeles. She subsequently received a master’s degree in
Psychology from Harvard University and received her Ph.D. in Organizational Behavior from the
Harvard Joint Doctoral Program. She has promised to stop collecting degrees.

Fadi Chehadé is Co-Founder, Chairman & CEO of Viacore, Inc. Viacore, founded in April
1999, specializes in private, trading community integration services. Viacore’s service, known as
BusinessTone™, delivers inter-business application integration without the risks, delays and
limitations inherent with internal implementations. This allows Viacore’s customers to focus on
optimizing their processes and applications, and managing the business relationships within their
community.

Mr. Chehadé has 18 years experience in the computer industry and a proven track record as a
startup CEO. He has founded three companies since 1989, including RosettaNet, the computer
and electronic components industries leading eBusiness consortium. Prior to RosettaNet, Mr.
Chehadé was vice president of Ingram Micro’s Customer Information Services Group where he
led the creation and development of Ingram Micro's web-based extranet, successfully weaving
hundreds of suppliers and thousands of resellers into a powerful business web of applications and
content.
In a period spanning more than a decade, he has built and promoted tools and practices that foster
cooperation between computer companies to facilitate electronic commerce amongst themselves
and with their trading partners. In 1992, he launched nettConnection™, an innovative Lotus
Notes-based extranet application, linking tens of companies in the U.S. to their distribution
channel partners in 36 countries, enabling efficient commerce and structured information sharing.

Previously, Mr. Chehadé was CEO of Infoware Development, a software developer of business
publishing tools designed to build corporate information warehouses on the Internet. In 1989, he
founded Connectica, Inc., which designed and implemented marketing and distribution strategies
for U.S. based software publishers to penetrate European and Asian markets.

Mr. Chehadé is a graduate of Stanford University, where he earned a Master's degree in
Engineering Management. He also earned a Bachelor's degree in Computer Science from
Polytechnic University in New York.

Howard Schmidt -- Howard joined eBay as Vice President and Chief Information Security
Officer in May of 2003. He retired from the White House after 31 years of public service. He
was appointed by President Bush as the Vice Chair of the President’s Critical Infrastructure
Protection Board and as the Special Adviser for Cyberspace Security for the White House in
December 2001. He assumed the role as the Chair in January 2003 until his retirement in May
2003.

Prior to the White House, Mr. Schmidt was chief security officer for Microsoft Corp., where his
duties included CISO, CSO and forming and directing the Trustworthy Computing Security
Strategies Group.

       Jerry Hanley (bio to be provided)

Dr. Joseph S. Kraemer holds the title of Director at Law and Economics Consulting Group
(LECG), a consulting firm with expertise in capital-intensive industries undergoing structural
change. He is an experienced management consultant who works across multiple industries,
geographies, and client situations. He has assisted numerous companies to enter or exit a variety
of technology-related markets.

Dr. Kraemer has worked with, and served as counselor to, senior management at communications
and high tech companies in Asia, Europe, and the Americas. He speaks at conferences around the
world, has been an expert witness before regulatory and legislative forums, and has been quoted
frequently in major publications and the trade press. Dr. Kraemer has participated as a facilitator
and advisor to senior management and corporate boards on projects that focus on the impacts of
competition, strategies for revenue growth, and requirements for rapid organizational change. He
has also undertaken multiple due diligence projects for financial institutions.

Recent publications and presentations include: “Competition Policy and the Local Telephone
Industry” (June 2001); “Beyond the Network: The E-Commerce Opportunity for the U.S.
Telecommunications Industry” (Summer 2001); and “Global Telecom Trends: A U.S.
Perspective” (May 2001). His current project is an assessment of strategic trends in the
telecommunications industry (2001-2005).

Dr. Kraemer serves on the faculties of both the Georgetown University McDonough School of
Business and the Kogod Business School of American University where he specializes in
business strategy and e-commerce courses. He has served on several boards, including Exigent
(NasdaQ) and the Center for Telecommunications Management (University of Southern
California). The Progress & Freedom Foundation (Washington, D.C.) has designated Dr.
Kraemer a Senior Fellow.

Dr. Laree Kiely, President of LKi--Organizational Effectiveness Consultants--also serves as
Professor on the faculty of the Marshall School of Business at the University of Southern
California, where she teaches in the Executive MBA, executive education, and facilitator and
trainer programs.    She has 25 years' experience consulting, facilitating, and teaching
organizational behavior in the US, Canada, Australia, the Czech Republic, and the People’s
Republic of China.

Dr. Kiely is the former manager of Technology Services at First Interstate Bank. Her work has
helped such clients as Daimler-Chrysler, The Center for Telecommunications Management,
NBC, Paramount, The National Sports Management Institute, The Ronald Reagan Foundation,
Toyota, IBM, Xerox, Arco, Allergan, Siemens, Southern Cal Edison, BW/IP, Email (Australia),
Martin-Marietta, Honeywell, The Singer Company, Kraft Foods, Kaiser-Permanente, various
police and fire departments, city bureaus, hospitals and health care organizations, The American
Bar Association, The Young Lawyers Association, and The Asian Business Association.

She received Her B.A. and M.A. from the University of Colorado and her Ph.D. from the
University of Southern California. Dr. Kiely is active in numerous professional societies devoted
to management studies. Among these are the Society for Professionals in Dispute Resolution
(SPIDR); The International Society for Intercultural Education, Training, and Research
(SIETAR); The Academy of Management; The Academy of Family Mediators (AFM); and The
International Platform Association.

Dr. Kiely is the recipient of several teaching awards including the USC Marshall School of
Business “Golden Apple” Award for Teaching Excellence and the “Teacher of the Year” Award
from the USC Food Industry Management Program. Her Distance Learning Course called
“Leading the Global Workforce” was awarded the Best Distance Learning Program of 1996 by
the International Distance Learning Association. In 1997, she was given the “Most Significant
Contribution by an Individual to Distance Learning” award by IDLCON. In 1998, she was
awarded the overall “Excellence in Distance Learning Teaching” IDLCON, and in 1999, her
course on “Negotiation: Plays, Ploys, and Pitfalls” was granted the Best Distance Learning
Program for Corporate Development from IDLCON.

In addition to several papers and articles on communication issues, Dr. Kiely is the author of
Business Communication: Tools for Leadership; and co-author of Taking Charge: A Guide to
Personal Productivity, (Addison-Wesley, 1991), Everything’s Negotiable, Amacom Press, 1994.
You can see her award-winning program Business Communication:                Tools for Leadership,
regularly on PBS/ETV.

Lokesh Sehgal is an industry analyst engaged in education, research, and consulting on issues of
business strategy, global transformation and competitive marketing in the communications
industry. Mr. Sehgal’s insights and perspectives assist his clients in integrating the technological,
financial, marketplace, people, and process dynamics of the communications business.

For nearly a decade, he has advised executives and conducted workshops in the U.S., Canada,
Europe, and Latin America for managers representing local and long distance operators, wireless
carriers, cable companies, and computers and communications equipment manufacturers. He is
also a speaker at industry forums and at management programs organized by USC.

Mr. Sehgal’s latest publication, “Puzzled by Telecom”, is a creative learning tool for telecom
professionals to enhance their knowledge of the communications industry. His previous book,
“Mirages, Oases, and Roadkill on the Information Highway” analyzes the competitive dynamics
of the communications industry. He has also authored papers and reports on a diverse range of
subjects and companies in the information industry.

Keeping pace with learning trends, Mr. Sehgal has rolled-out two interactive e-learning courses:
“Competitive Collisions in the Communications Industry” that analyzes the competitive scenario
in the U.S. marketplace; and “Telecom QuizMaster” that stimulates learning and knowledge
development about the global communications industry.

Mr. Sehgal was the Senior Marketing Advisor to the U.S. Commerce Department (1986-1992)
and structured major Indo-U.S. business tie-ups for exports, technology transfer, and equity
investments.

Mr. Sehgal has a Bachelor’s in Science and a Masters in Business Administration.

Madhavan Vasudevan while with the Sand Hill Group (http://www.sandhill.com), released a
report on Enterprise Security that he co-authored with the firm's founder MR Rangaswami.
Previously, Madhavan directed product management and marketing for two emerging technology
firms: Jarna, an enterprise wireless middleware company that was acquired by Visto, and
Gigabeat, a personalization startup specializing in digital-media delivery that was acquired by
Napster. He also held management, research, and manufacturing positions in the biotechnology
and food industries in both the United States and abroad at Cepra a bioprocess engineering start-
up where he was founder/CTO, Pall Corporation, General Foods and Brooke Bond a Unilever
subsidiary. Madhavan holds a Masters in Computer Science from Stanford University as well as a
doctorate in biochemcial engineering from Rutgers University and a bachelors in chemical
engineering from the Indian Institute of Technology, Kanpur, India.

Steven R. Rayner is founder of the consulting and training firm Rayner & Associates, Inc. and is
a leading authority in the area of high performance work systems and corporate transformation.
He is also co-founder of the American Center for Strategic Transformation.
Rayner is the author of several books including: Team Traps: Survival Stories and Lessons from
Team Disasters, Near-Misses, Mishaps and Other Near-Death Experiences (John Wiley & Sons,
May 1996); Recreating the Workplace: The Pathway to High Performance Work Systems (John
Wiley & Sons, June 1993) and co-author of Shaping the Future: A Dynamic Process for Creating
and Achieving Your Company’s Strategic Vision (AMACOM, June 2004), Team Innovations:
Best Practice Tools and Resources for Team Based Management (Watson-Wyatt, May 1996) and
Tips For Teams: A Ready Reference for Solving Common Team Problems (McGraw-Hill,
August 1994). He has also authored numerous articles on the subject of high performance work
systems. His extensive writings have been published by the National Productivity Review, Work
in America Institute, the American Society for Training and Development, Oregon State
University, the University of Minnesota, Jossey-Bass Publishers and Belgard•Fisher•Rayner. In
addition, he has written articles for internal publication at major corporations including Boeing,
Tektronix, Goodyear, Calgon-Carbon and Monsanto.

Rayner regularly speaks at industry, academic and professional conferences on the subject
of high performance work systems. He has addressed audiences at the Ecology of Work
Conferences, the Association of Quality and Participation Conference, the American Production
and Inventory Control Society, the American Society for Training and Development, the
International Conference on Self-Managed Work Teams as well as company and academic
sponsored conferences including those hosted by the University of Pittsburgh, the University of
North Texas, Oregon State University, IBM Canada, Ltd., Digital Equipment Corporation,
Harley-Davidson, Esso Resources, Tektronix, Hewlett-Packard, Phillips Petroleum, Texas
Instruments and Washington Water Power. In addition, Rayner has served on the faculty of the
University of Washington as a guest lecturer.

Rayner’s firm has worked with a number of companies implementing high involvement practices
across North America and the United Kingdom. Its clients include Boeing, Harley-Davidson,
IBM Canada, Microsoft, Puget Sound Energy, Solutia, and Weyerhaeuser,.

Rayner was an honors graduate from both Lewis and Clark College (where he received his B.A.)
and Pepperdine University (where he received his M.S.)

Steven Shepard is the president of the Shepard Communications Group in Williston, Vermont. A
professional writer and educator with 22 years of varied experience in the telecommunications
industry, he has written books and magazine articles on a wide variety of topics. He is the author
of Telecommunications Convergence: How to Profit from the Convergence of Technologies,
Services and Companies (McGraw-Hill, New York, 2000); A Spanish-English
Telecommunications Dictionary (Shepard Communications Group, Williston, Vermont, 2001);
Managing Cross-Cultural Transition: A Handbook for Corporations, Employees and Their
Families (Aletheia Publications, New York, 1997); An Optical Networking Crash Course
(McGraw-Hill, New York, February 2001); SONET and SDH Demystified (McGraw-Hill, 2001),
A Telecommunications Crash Course (McGraw-Hill, New York, October 2001);
Telecommunications Convergence, Second Edition (McGraw-Hill, New York, February 2002);
Videoconferencing Demystified (April 2002, McGraw-Hill); Metro Networking Demystified
(McGraw-Hill, New York, October 2002); and Telecom Jeopardy: Charting a Path in Uncertain
Times (McGraw-Hill, New York, September 2003). Storage Technologies Demystified and
Telecomm Regulation Demystified will be released in 2004. Steve is also the Series Editor of the
McGraw-Hill Portable Consultant book series.

Mr. Shepard received his undergraduate degree in Spanish and Romance Philology from the
University of California at Berkeley and his Masters Degree in International Business from St.
Mary's College. He spent eleven years with Pacific Bell in San Francisco in a variety of capacities
including network analysis, computer operations, systems standards development, and advanced
technical training, followed by nine years with Hill Associates, a world-renowned
telecommunications education company, before forming the Shepard Communications Group.
He is a member of the Boards of Directors of Transylvania Telecom (Really!), Circus Smirkus,
the Regional Educational Television Network, Intechron USA, and a member of the Board of
Trustees of Champlain College in Burlington, Vermont. He is also the Resident Director of the
University of Southern California’s Executive Leadership and Advanced Management Programs
in Telecommunications and adjunct faculty member at the University of Southern California, The
American Graduate School of International Management (Thunderbird University), the
University of Vermont, Champlain College and St. Michael’s College. He is married and has two
children.

Mr. Shepard specializes in international issues in telecommunications with an emphasis on
strategic technical sales; convergence and optical networking; the social implications of
technological change; the development of multilingual educational materials; and the effective
use of multiple delivery media. He has written and directed more than 40 videos and films and
written technical presentations on a broad range of topics for more than 70 companies and
organizations worldwide. He is fluent in Spanish and routinely publishes and delivers
presentations in that language. Global clients include major telecommunications manufacturers,
service providers, software development firms, multinational corporations, universities,
advertising firms, and regulatory bodies.

Terry Benzel has over 20 years of research experience in a wide range of, information security
technologies, previously was a vice president at a major security software vendor , and is
currently the technical coordinator for DETER Cyber Security Testbed. Terry is Assistant
Director for Special Projects at the Information Sciences Institute, University of Southern
California.

Standards and Best Practices Overview

As part of our public private partnership, we have been provided with a grant from DHS to
perform the first National Cyber Security Survey on Preparedness to establish a baseline for
Standards and Best Practices. This survey will be concluded by June of 2005 with a full report to
DHS and our Founding and Industry Partners (as sponsors) by the end of September, 2005.
Taken in conjunction with our SSM continuum, companies can begin to measure their progress in
closing the gap.

Awareness Creation: Executive Briefings Overview
Our Executive Briefings on Information Security and Protection introduce C Level decision
makers to current needs and future development and trends. As outlined in the National Strategy
for Homeland Security and the National Strategy to Secure Cyberspace, there is a critical need to
protect the nation's information infrastructure through public private partnerships. Sponsored by
the Lord Foundation and our Founders Members and Solution Partners, these Executive Briefings
are designed to share information, provoke discussion and increase understanding on how to
reduce the current vulnerabilities of the information infrastructure owned by the private sector.

ICIIP’s first Executive Briefing was on Risk Management and IT Governance while its second
briefing tackled the real issue of information security: Human Factors. Our third briefing will be
about hardening the Technology node and the dynamic tension points between People, Process
and Organization.

Public Private Partnership

With more than 85% of the nations infrastructure owned and operated by private industry, it is
essential that private industry work together with government authorities. ICIIP has created the
opportunity for private industry to partner within an academic setting and offer four levels of
partnerships:

        Founding Members




        Solutions Partners
       Alliance Partners




                                                                   & ITAA,ITGI

       & Research Partners




   

Industry Partnership Participation Levels:

Founders Council Executive Committee Membership
      Contribution: $250 per year
      Long-term, interdisciplinary, collaborative research on pre-competitive
      technologies
      Partner-directed, partner-specific research projects
      Commitment to operations
      Member Benefits
             oIP licensing rights to directed research project deliverables
             oRights to pre- competitive research results
             oSeat on the Founding Council Executive Committee
             oAbility to leverage research funding over the next 3 years
             oAbility to compete more effectively to hire USC students
             oPermission to send up to four representatives to ICIIP events
             oReduced prices for employee executive education and training
             oDirect involvement in development, approval adoption and
             implementation of ICIIP Standards and Best Practices
             oGain exposure and business relationships

Founders Council Membership
      Contribution: $75K per year (CTM Members $50K)
      Long-term, interdisciplinary, collaborative research on pre-competitive
      technologies
      Commitment to operations
      Member Benefits
             oRights to pre-competitive research results
             oAbility to leverage research funding over the next 3 years
                oAbility to compete more effectively to hire USC students
                oPermission to send up to two representatives to ICIIP events
                oReduced prices for employee executive education and training
                oDirect involvement in development, approval, adoption and
                implementation of ICIIP Standards and Best Practices
                oGain exposure and business relationships

Solution Partner Membership
       Contribution: $15K per year (CTM Members $10K)
       Long-term, interdisciplinary, collaborative research on pre-competitive
       technologies
       Commitment to operations
       Solution Partner Benefits
              oAbility to compete more effectively to hire USC students
              oDirect involvement in development, approval adoption and
              implementation of ICIIP Standards and Best Practices
              oGain exposure and business relationships
              oNetworking opportunities

Research Partners
      Contribution: An agreed upon amount based on total project
      Partner-directed, partner-specific research projects
      Commitment to operations
      Member Benefits
             oSeat on the Founding Council Executive Committee
             oPermission to send up to two representatives to ICIIP events
             oReduced prices for employee executive education and training
             oDirect involvement in development, approval adoption and
             implementation of ICIIP Standards and Best Practices
             oGain exposure and business relationships

USC Partners:

We also consider ourselves one of the leaders at USC in initiating cross collaborative
opportunities among and within schools and take pride in naming the following as USC Partners:

USC/CEO – Center for Effective Organizations, A research center in the Marshall School of
Business focusing on those issues of organizational effectiveness that involve the design and
management of complex organizations.

USC Viterbi Engineering School

Mobile Media Institute (MMI), a new interdisciplinary research forum created by the University
of Southern California to help develop the mobile Internet marketplace.
Information Sciences Institute (ISI) for over the last 30 years, ISI has emerged as one of the
world's leading research centers in the fields of computer science and information technology. ISI
has long been a major contributor to the nation's information technology knowledge base, and is
actively engaged in a broad spectrum of information processing research, as well as being heavily
involved in the development of advanced computer and communication technologies. Our
research divisions are under the direction of nationally recognized research scientists in fields
such as:

       Artificial intelligence
       Computational science and computer architecture
       Computer security
       Electronic commerce
       Human-Centered support systems
       Integrated circuit design and fabrication
       Internet communications and advanced networking
       Natural language technology
       Parallel and grid computing
       Robotics
       Systems integration

ISI currently has more than 300 researchers, graduate students, and staff. We are always looking
for new collaborators - new students, new researchers, and new institutional, business and
government partners.

       Annenberg School of Communications
       USC/CSO- Robert Wood

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:25
posted:5/18/2012
language:English
pages:27
fanzhongqing fanzhongqing http://
About