SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
4/8/2016 The Day After: Preparing to Respond to National Cyber Crises
http://www.atlanticcouncil.org/events/past­events/the­day­after­preparing­to­respond­to­national­cyber­crises 1/7
The Day After: Preparing to Respond to National Cyber
Crises
By J.L. Billingsley
Given that all entities are susceptible to being hacked, how will (not would) a federal government like that
of the United States respond to the potential compromise of a critical asset like the Global Positioning
System (GPS)? For the fourth year in a row, the Atlantic Council has been at the forefront of proactively
tackling such cyber­related national security policy challenges by hosting the Cyber 9/12 Student
Challenge. The Military Cyber Professionals Association (MCPA) and its members were honored to
recently conclude its second year of direct support to the event. Having served as a reviewer, presenter,
and judge at the event, here are some reasons why I look forward to the event’s continued growth. 
Influencing policy takes time. 
This event scenario charges each team of four to present policy response options to the National Security
Council (NSC). Any national level crisis response requires a reallocation of available resources (money,
personnel, intelligence assets, etc.), if not lengthy requests for more resources before Congress. Given the
hierarchical nature of policy making and resource allocation within the US government, each echelon
involved exacts a delay in responsiveness by applying their own decision­making processes. The result is
what some in military circles refer to as an elongated “flash to bang time” that increases the risk of failing
to achieve the desired response objectives. Simulations, table­top exercises (TTX), and/or Rehearsal of
Concept (ROC) Drills are well known and effective ways to help identify the actions, structures, or
capabilities needed to be better poised to respond to the realities of operating in an increasingly dangerous
cyberspace environment.
While the building of entities like US Cyber Command (USCC) and the National Cybersecurity Center of
Excellence (NCCoE) are good examples of national efforts to optimize responses to anticipated
challenges, one must consider the dimension of time. While USCC was officially established about seven
years ago (not counting a probably lengthy staffing process preceding the final decision and public
announcement), its subordinate Cyber Mission Force (CMF) is still years away from being fully built out
and ready to effectively serve in its intended role. Anybody who has ever built a team of any type, be it in
little league baseball or in Silicon Valley startups, understands that assembling the pieces (personnel, real,
4/8/2016 The Day After: Preparing to Respond to National Cyber Crises
http://www.atlanticcouncil.org/events/past­events/the­day­after­preparing­to­respond­to­national­cyber­crises 2/7
estate, equipment, etc.) is only the first step in a long process of making that team effective. The Cyber
9/12 Student Challenge serves as just the type of exercise that gets policy wonks, technologists, and the
elusive cyber­wonk hybrid to think seriously about such issues and produce innovative solutions well
before they are needed. 
 
Presentation by team from the US Military Academy at West PointDiversity really matters. 
This event is exceptionally inclusive, welcoming teams from the Ivy League, completely online schools,
military academies, historically black universities, Middle America, and the coasts. The sharp
undergraduate competitors, sometimes including teenagers, gave many mid­career graduate students
some serious competition. While this article focuses on the American branch of the competition, the
Atlantic Council’s European­based competition includes teams from places such as the United Arab
Emirates. Such diversity of perspective is not only a good idea, but it is necessary to harvest the best
concepts from a greater pool of brainpower. Leveraging insights from science, like the Strength of Weak
Ties argument, we can better understand how inclusive events like this draw upon the ideas of groups that
may have otherwise never come into contact with one another. Ideas then emerge that can help better
inform policy, since there is such a thirst for fresh approaches within the hallowed halls of Congress, the
White House, and beyond.
We need to remember that the population of personnel within our national security apparatus that are
4/8/2016 The Day After: Preparing to Respond to National Cyber Crises
http://www.atlanticcouncil.org/events/past­events/the­day­after­preparing­to­respond­to­national­cyber­crises 3/7
read­in to a wide range of national­level capabilities (which may have been developed over years of
substantial taxpayer investments) is necessarily small, since risk of disclosure (intended or not) increases
with each individual. That small population is made further miniscule when considering how many of them
actually understand those existing capabilities from a technical grounding and from what is sometimes
referred to as “the art of the possible” (requiring years of prior education and experience). Short of actually
being read­in to such capabilities and knowing the ins and outs of the NSC, this competition incentivizes a
broad array of students to consider such scenarios before they find themselves in a position to offer real
world solutions. This competition gamifies the process of learning about what may otherwise be seen as
somewhat intimidating material.
I, and many others, can attest to the real world returns on previous investments made in academia. The
beauty of this being a competition for students is that it gives the competitors a level of freedom and time
to think about what the correct response should be, instead of being forced to make a quick
recommendation in a more operationally­focused environment surrounded by personnel that value
decisiveness and who may have little understanding of technology. Efforts such as the Cyber 9/12 Student
Challenge ultimately grow the currently finite pool of personnel that are fluent in the ways of cyberspace,
as well as national security policy.  
4/8/2016 The Day After: Preparing to Respond to National Cyber Crises
http://www.atlanticcouncil.org/events/past­events/the­day­after­preparing­to­respond­to­national­cyber­crises 4/7
Retired Major General John Davis (left) and J. L. Billingsley (right) recognize the “best military team”
We are among friends. 
The widespread support for this event by members of the MCPA is a point of pride in the American military
cyber community, as well as clear evidence that the event is consistent with the noble ideals of the MCPA.
A sense of great comfort came over me as I took the podium at American University’s School of
International Service to congratulate the competition’s “Best Military Team,” since I was surrounded by
supportive colleagues, new and old.
For example, Major General John Davis (Ret.) not only served as a VIP judge in the final rounds of the
event and awarded the “Best Military Team” the Order of Thor medal, he is also a member of the MCPA
Board of Advisors and has played a critical role in the organization’s ongoing success. Jay Healey, also an
MCPA Advisor, this year served as coach of the team from Columbia University’s School of International
and Public Affairs. It was under his leadership as Director of the Atlantic Council’s Cyber Statecraft
Initiative that the Cyber 9/12 Student Challenge was first developed. 
4/8/2016 The Day After: Preparing to Respond to National Cyber Crises
http://www.atlanticcouncil.org/events/past­events/the­day­after­preparing­to­respond­to­national­cyber­crises 5/7
Spectators and judges, including MCPA Chief of Staff Sana Saleh, listen to a presentation
Other team coaches included very active MCPA members. For example, the coaches from Air University
(Dr. Pano Yannakogeorgos) and Harvard University (Dr. Michael Sulmeyer) have been involved in the
production of the MCPA’s peer­reviewed journal, Military Cyber Affairs. Two coaches from National
Defense University (Dr. Carl Horn and Dr. Alex Crowther) have both played active roles in MCPA outreach
activities in our nation’s capital. Compounding the honor of serving as a judge alongside the biggest
names in the cyber policy world, other MCPA members served as fellow judges, including Sana Saleh
(MCPA Chief of Staff) and Dr. Aaron Brantly (Army Cyber Institute Policy Fellow). 
4/8/2016 The Day After: Preparing to Respond to National Cyber Crises
http://www.atlanticcouncil.org/events/past­events/the­day­after­preparing­to­respond­to­national­cyber­crises 6/7
Presentation by team from the US Naval Academy at Annapolis       
With the increased participation of teams from military affiliated schools (including the academies at West
Point and Annapolis), this was the first year that the event organizers invited the MCPA to recognize the
best military team. True to MCPA traditions, the winners (from Air University) were awarded the coveted
Order of Thor medal. This medal is used to recognize excellence in the American military cyber
community. The mythological warrior Thor, who adorns the medal, wields the hammer – a tool with the
power to both build and destroy, which are characteristics shared by cyberspace. 
4/8/2016 The Day After: Preparing to Respond to National Cyber Crises
http://www.atlanticcouncil.org/events/past­events/the­day­after­preparing­to­respond­to­national­cyber­crises 7/7
The winning team from Air University wearing the Order of Thor medal, joined by Jay Healey, retired
General Norton Schwartz, and other colleagues
      
Through the Cyber 9/12 Student Challenge, the Atlantic Council has made a true contribution to raising the
level of the discussions surrounding cyber conflict. It is increasing the pool of those who have invested real
effort in understanding both the relevant technological and policy environments. When considering the
ancient truism that people fear what they do not understand, and (as Yoda teaches) fear ultimately leads to
suffering, this event may actually lower the risk of unnecessary conflicts. For all the reasons discussed
above and more, I look forward to the continued growth of this important effort.
J. L. Billingsley is Founder of the MCPA, Advisor of the Cyber Security Forum Initiative, Fellow at the
Center for Network Innovation and Experimentation, PhD student at the Naval Postgraduate School
Information Sciences Department, a graduate of programs at both the Army and Naval War Colleges, and
serves as an officer in the US Army. The views and opinions expressed above are those of the author and
are not those of the USG, US Army, or any other organization. All images are courtesy of the Atlantic
Council photographer, Nuri Jeon.
COUNCIL IN THE NEWS
April 7, 2016

Weitere ähnliche Inhalte

Ähnlich wie The Day After: Preparing to Respond to National Cyber Crises

CSFI-Cyber_Conflict_Post_Exercise
CSFI-Cyber_Conflict_Post_ExerciseCSFI-Cyber_Conflict_Post_Exercise
CSFI-Cyber_Conflict_Post_ExerciseConnie Uthoff
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementThomas Ewert
 
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mReply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mfelipaser7p
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesChikere Uchegbu
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infrasimisterchristen
 
Cyber 9/12 Student Challenge General Information
Cyber 9/12 Student Challenge General InformationCyber 9/12 Student Challenge General Information
Cyber 9/12 Student Challenge General Informationatlanticcouncil
 
Hsl Capstone Project J
Hsl Capstone Project JHsl Capstone Project J
Hsl Capstone Project Jjlevy
 
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxJustin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxtawnyataylor528
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedSusanaFurman449
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMADavid Sweigert
 
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”KTN
 
Cyber912 student challenge_two_pager_general
Cyber912 student challenge_two_pager_generalCyber912 student challenge_two_pager_general
Cyber912 student challenge_two_pager_generalatlanticcouncil
 
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyRand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyInternet Law Center
 
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docxWELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docxalanfhall8953
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Mark Raduenzel
 
Education Please respond to the following· Based on the lectu.docx
Education Please respond to the following· Based on the lectu.docxEducation Please respond to the following· Based on the lectu.docx
Education Please respond to the following· Based on the lectu.docxSALU18
 
The_Guardian_Antiterrorism_Journal_Fall_2010_PUBLIC_version
The_Guardian_Antiterrorism_Journal_Fall_2010_PUBLIC_versionThe_Guardian_Antiterrorism_Journal_Fall_2010_PUBLIC_version
The_Guardian_Antiterrorism_Journal_Fall_2010_PUBLIC_versionJason Strickland
 

Ähnlich wie The Day After: Preparing to Respond to National Cyber Crises (20)

Cyber security issue part b
Cyber security issue  part b Cyber security issue  part b
Cyber security issue part b
 
CSFI-Cyber_Conflict_Post_Exercise
CSFI-Cyber_Conflict_Post_ExerciseCSFI-Cyber_Conflict_Post_Exercise
CSFI-Cyber_Conflict_Post_Exercise
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk Management
 
Mid-Atlantic INLETS 2017
Mid-Atlantic INLETS 2017Mid-Atlantic INLETS 2017
Mid-Atlantic INLETS 2017
 
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mReply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infra
 
CIP Report
CIP ReportCIP Report
CIP Report
 
Cyber 9/12 Student Challenge General Information
Cyber 9/12 Student Challenge General InformationCyber 9/12 Student Challenge General Information
Cyber 9/12 Student Challenge General Information
 
Hsl Capstone Project J
Hsl Capstone Project JHsl Capstone Project J
Hsl Capstone Project J
 
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxJustin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docx
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
Global Expert Mission Report “US East Coast in Cybersecurity in September 2019”
 
Cyber912 student challenge_two_pager_general
Cyber912 student challenge_two_pager_generalCyber912 student challenge_two_pager_general
Cyber912 student challenge_two_pager_general
 
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyRand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
 
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docxWELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
 
Education Please respond to the following· Based on the lectu.docx
Education Please respond to the following· Based on the lectu.docxEducation Please respond to the following· Based on the lectu.docx
Education Please respond to the following· Based on the lectu.docx
 
The_Guardian_Antiterrorism_Journal_Fall_2010_PUBLIC_version
The_Guardian_Antiterrorism_Journal_Fall_2010_PUBLIC_versionThe_Guardian_Antiterrorism_Journal_Fall_2010_PUBLIC_version
The_Guardian_Antiterrorism_Journal_Fall_2010_PUBLIC_version
 

Kürzlich hochgeladen

Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and NumberCall Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and NumberSareena Khatun
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)NAP Global Network
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processNAP Global Network
 
74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptxpiyushsinghrajput913
 
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7Delhi Call girls
 
Unique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfUnique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfScottMeyers35
 
3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.Christina Parmionova
 
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girlsPakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girlsMonica Sydney
 
Honasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdfHonasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdfSocial Samosa
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCNAP Global Network
 
sponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfsponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfSERUDS INDIA
 
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Menggugurkan Kandungan 087776558899
 
NAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptxNAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptxNAP Global Network
 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLSarandianics
 
31st World Press Freedom Day Conference in Santiago.
31st World Press Freedom Day Conference in Santiago.31st World Press Freedom Day Conference in Santiago.
31st World Press Freedom Day Conference in Santiago.Christina Parmionova
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisChristina Parmionova
 
World Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - PosterWorld Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - PosterChristina Parmionova
 
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Partito democratico
 

Kürzlich hochgeladen (20)

Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and NumberCall Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx
 
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
 
Unique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfUnique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdf
 
3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girlsPakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
 
Honasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdfHonasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdf
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
sponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfsponsor for poor old age person food.pdf
sponsor for poor old age person food.pdf
 
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
 
NAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptxNAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptx
 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
 
31st World Press Freedom Day Conference in Santiago.
31st World Press Freedom Day Conference in Santiago.31st World Press Freedom Day Conference in Santiago.
31st World Press Freedom Day Conference in Santiago.
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
 
World Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - PosterWorld Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - Poster
 
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition PlansSustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
 
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019
 

The Day After: Preparing to Respond to National Cyber Crises