Continuity (BC) is the capability of the organization to continue delivery of products
or services at acceptable predefined levels following disruptive incidents
The focus of
this seminar will be (1)
Defining the Business Continuity and its importance (2) Illustrating Canada
Public Safety BC framework: steps and deliverables (3) Presenting the Business
Impact Analysis (BIA) Process in details with an applied example.
Speaker: Dr. Ola Abdrabou
Visiting Professor, the Infrastructure Protection and Security (IPIS) Program-
Faculty of Engineering, Carleton University.
This presentation discusses BluWave-ai’s findings on applying machine learning techniques for time series prediction in smart grids. In particular, the Summerside Electric grid is used as an example to demonstrate the effectiveness of more accurate artificial intelligence (AI)-enabled predictors on reducing the overall cost of energy for grid operators.
Located in Prince Edward Island (PEI), Canada, Summerside Electric grid has a 12 MW local wind farm, introducing Canada’s first municipally owned and operated wind farm. In 2018, around 25% of the 137.5 TWh electrical demand was met by the wind farm, while the rest was mostly imported from New Brunswick (NB) Power by scheduling an hourly power import; the city pays a commitment rate for scheduled power. Wind farm stochastic output yields costly inaccuracy in import scheduling, as power surplus is exported back to NB Power at a lower rate and power deficit is imported in real-time at a much higher rate than the commitment rate.
To address the scheduling inaccuracy, Summerside grid data from 2016 to 2018 is leveraged to design more accurate AI-enabled time series predictors, revealing the significant potential for reducing energy cost in renewable-penetrated grids through state-of-the-art predictors.Machine learning flyer BluWave
Software Defined Networking (SDN) and Network Function Virtualization (NFV) are the key pillars of future networks, including 5G and Beyond that promise to support emerging applications such as enhanced mobile broadband, ultra-low latency, massive sensing type applications while providing the resiliency in the network.
Service providers and other verticals (e.g., Connected Cars, IOT, eHealth) can leverage SDN/NFV to provide flexible and cost-effective service without compromising the end user quality of service (QoS). While NFV and SDN open up the door for flexible networks and rapid service creation, these offer both security opportunities while also introducing additional challenges and complexities, in some cases.
With the rapid proliferation of 4G and 5G networks, operators have now started the trial deployment of network function virtualization, especially with the introduction of various virtualized network elements in the access and core networks. These include elements such as virtualized Evolved Packet Core (vEPC), virtualized IP Multimedia Services (vIMS), Virtualized Residential Gateway, and Virtualized Next Generation Firewalls. However, very little attention has been given to the security aspects of virtualization.
While several standardization bodies (e.g., ETSI, 3GPP, NGMN, ATIS, TIA) have started looking into the many security issues introduced by SDN/NFV, additional work is needed with larger security community involvement including vendors, operators, universities, and regulators.
This tutorial will address evolution of cellular technologies towards 5G but will largely focus on various security challenges and opportunities introduced by SDN/NFV and 5G networks such as Hypervisor, Virtual Network Functions (VNFs), SDN Controller, Orchestrator, Network slicing, Cloud RAN, and security function virtualization. This tutorial will also highlight some of the ongoing activities within various standards communities and will illustrate a few deployment use case scenarios for security including threat taxonomy for both operator and enterprise networks.
In addition, I will also describe some of the ongoing activities within IEEE Future Network initiative including roadmap efforts and various ways one can get involved and contribute to this initiative.
The IEEE Ottawa Section meetings consists of:
- Call To Order and Introduction
- Acceptance of the Agenda of the Meeting
- Acceptance of the Previous Meeting Minutes
- Scheduled New Business
- Officer Reports
- Student Reports
- Chapter Reports
- Affinity Group Reports
- Committee Reports
If you are interested in presenting to the Section, please email our secretary: Travis Jardine (firstname.lastname@example.org)
The advent of the Internet of Things (IoT) has enabled the development of systems capable of collecting and processing vast amounts of data to enhance system operation and/or to predict or tailor user experiences. The development, adoption, and evolution of systems with more complex software and increased connectivity enabled by IoT technologies has led to a new frontier of cybersecurity vulnerabilities from which such systems were previously shielded. As a result, there is an ever-growing need to evaluate and assure the cybersecurity of IoT-enabled systems, and the information that they use, store, and communicate, in the face of cyber-attacks and failures.
In this talk, Dr. Jaskolka will explore the growing range of complex challenges faced when evaluating and assuring the cybersecurity of IoT-enabled systems. Dr. Jaskolka will also discuss the opportunities that this presents in developing new and innovative ways to engineer more secure and trustworthy IoT-enabled systems. In particular, Dr. Jaskolka will present recent advances in addressing system-level cybersecurity evaluation and assurance using an example IoT-enabled system.
About the speaker:
Dr. Jason Jaskolka is an Assistant Professor in the Department of Systems and Computer Engineering at Carleton University, Ottawa, ON, Canada. He received his Ph.D. in Software Engineering in 2015 from McMaster University, Hamilton, ON, Canada. His research interests include cybersecurity evaluation and assurance, security-by-design, and formal methods and algebraic approaches for software and security engineering. He is interested in applying his research to critical infrastructures, cyber-physical and distributed systems, and the Internet of Things (IoT).
I.E.E.E WIE-Cybersecurity Evaluation and Assurance for IoT-Enabled Systems