Developing a C4I Architecture for the Netherlands Armed Forces
|
|
- Dorthy Ellis
- 6 years ago
- Views:
Transcription
1 Developing a C4I Architecture for the Netherlands Armed Forces Dick Ooms & Tim Grant Netherlands Defence Academy 1 JOINT? COMBINED 2 1
2 Presentation Structure Why a C4I Architecture? Starting point New approach C4I Architecture Products Process Model & Services Model What we learned so far 3 Presentation Structure Why a C4I Architecture? Starting point New approach C4I Architecture Products Process Model & Services Model What we learned so far 4 2
3 Navy C2 systems 5 Army mobile C2 6 3
4 Air Force & Army C2 Combined Air Operations Center (CAOC) Battalion Command Post (CP) in the field 7 Challenge 1: Effective information sharing among dissimilar entities 5/14/09 8 4
5 22 september 2006 Challenge 2: building the C2 chain NL Army suite of C2 systems MOBILE DEPLOYED TITAAN DISMOUNTED TITAAN RADIO NET DECIUS THEMIS XANTHOS AFSIS ISIS PALLAS OSIRIS CYRUS
6 Presentation Structure Why a C4I Architecture? Starting point New approach C4I Architecture Products Process Model & Services Model What we learned so far 11 DIVA Architecture Model conceptueel, direction wat/ composition logisch, implementation waarom RICHTING VORMGEVING hoe BV-Architectuur Goals and Tasks Concept of Operations Organisation Process Models Flow Organisationimplementation Entities, Roles & Activities IV-Architectuur Support Requirements Services Model Systems ICT-Architectuur Requirements for ICT Solutions Components model Building Blocks 12 6
7 DIVA Architecture Hierarchie 5/14/09 Corporate Architecture (HDIO) Sub Architectures C4I: CDS M&F: DMO/DFEZ P&O: HDP management::dio Aspect Architectures Security: BA Networks & Comms: DIO Integration: DIO C4I (sub) Architecture Project Architectures (DMO/IVENT) e.g. TITAAN, OMIS, MS Walrus, ISIS, BMS AFSIS etc. 13 Initial Operational Process Model 14 7
8 Presentation Structure Why a C4I Architecture? Starting point New approach C4I Architecture Products Process Model & Services Model What we learned so far 15 Boyd s OODA loop Cultural Traditions Observations Genetic Heritage Analyses & Synthesis Decision (Hypothesis) Action (Test) New Previous Experience Unfolding Interaction With Unfolding Interaction With Note how orientation shapes observation, shapes decision, shapes action, and in turn is shaped by the feedback and other phenomena coming into our sensing or observing window. From The Essence of Winning and Losing, John R. Boyd, January
9 Unfolding Interaction With Environme nt Genetic Heritage New Cultural Traditions Previous Experience Unfolding Interaction With Environme nt Unfolding Interaction With Genetic Heritage New Cultural Traditions Previous Experience Unfolding Interaction With Unfolding Interaction With Genetic Heritage New Cultural Traditions Previous Experience Unfolding Interaction With 22 september 2006 Possible Process Hierarchie Observations Decision (Hypothesis) Action (Test) Joint Air Defence Observations Decision (Hypothesis) Action (Test) Observations Decision (Hypothesis) Action (Test) Common Operational Picture Recognized Air Picture 17 Air Defence Parallel Processes Is everybody informed of my assessment and intentions? What is the current Air Picture? What is the ennemy s most likely course of action? What are my capabilities and possible courses of action? Do I need to adjust the alert state? What about the EMCON Plan? Do I need an adjustment of the Rules of Engagement? What is the actual weapon and fuel state of my fighters? Do I need to reposition my units in view of the threat axis? 18 9
10 Stakeholders & COIs Primary Stakeholders: CDS HDIO DMO CAMS & C2SC Major Operational Commands Predefined COIs: Non-operational: policy&doctrine, planning&budget, requirements, acquisition, R&D, HRM Operational: OPS-planning, -support, -security, C4I-planning & -management, weapon employment, sensor management, ISR/INTEL, education & training 19 Stakeholders, COIs and views 20 10
11 Purpose C4I Architecture provide guidance for definition C4I requirements support better scoping of C4I projects provide better cohesion between C4I projects provide guidance for project architectures set standards & technical requirements for C4I projects 21 Presentation Structure Why a C4I Architecture? Starting point New approach C4I Architecture Products Process Model & Services Model Next Steps What we learned so far 22 11
12 C4I Architecture products C4I Basic Considerations & Principles C4I Standards & Technologies Checklist C4I Requirement Process Technical Requirements & Guidelines Operational Process Model Operational Services Model 23 C4I Basic Considerations & Principles conceptueel, direction wat/ composition logisch, implementation waarom RICHTING VORMGEVING hoe BV-Architectuur Goals and Tasks Concept of Operations Organisation Process Models Flow Organisationimplementation Entities, Roles & Activities IV-Architectuur Support Requirements Services Model Systems ICT-Architectuur Requirements for ICT Solutions Components model Building Blocks 24 12
13 C4I Standards & Technologies conceptueel, direction wat/ composition logisch, implementation waarom RICHTING VORMGEVING hoe BV-Architectuur Goals and Tasks Concept of Operations Organisation Process Models Flow Organisationimplementation Entities, Roles & Activities IV-Architectuur Support Requirements Services Model Systems ICT-Architectuur Requirements for ICT Solutions Components model Building Blocks 25 Checklist C4I Requirement Process & Technical Requirements & Guidelines conceptueel, direction wat/ composition logisch, implementation waarom RICHTING VORMGEVING hoe BV-Architectuur Goals and Tasks Concept of Operations Organisation Process Models Flow Organisationimplementation Entities, Roles & Activities IV-Architectuur Support Requirements Services Model Systems ICT-Architectuur Requirements for ICT Solutions Components model Building Blocks 26 13
14 Development model Version 1.0 Version 0.x Version 1.x D: Using & testing Development first architecture products B1: Definition C1:Development (iterative) Follow-on development (iterative) Evolutional development Maintenance (iterative) A: Stakeholder-analysis B2: Definition C2: Development (iterative) Phase 2 (from April 2009) Phase 3 (t.b.d.) Time 27 Presentation Structure Why a C4I Architecture? Starting point New approach C4I Architecture Products Process Model & Services Model What we learned so far 28 14
15 Development Process & Services Models step 1: collect information at school / training center step 2: study material, develop 1st draft process model step 3: collect comments, develop 2nd draft step 4: test model by visits, observation, discussion step 5: correct, refine & amplify step 6: validate with all parties involved 29 Interdependencies conceptueel, direction wat/ composition logisch, implementation waarom RICHTING VORMGEVING hoe BV-Architectuur Goals and Tasks Concept of Operations Organisation Process Models Flow Organisationimplementation Entities, Roles & Activities IV-Architectuur Support Requirements Services Model Systems ICT-Architectuur Requirements for ICT Solutions Components model Building Blocks 30 15
16 Selection of processes to be modelled first Criteria: Joint Combined Imperfect Complementary Processes selected: - Joint Air Defence - Picture Compilation Ground Operations - Close Air Support Next: Peace Support Ops, CIMIC 31 Presentation Structure Why a C4I Architecture? Starting point New approach C4I Architecture Products Process Model & Services Model What we learned so far 32 16
17 What we learned so far involve stakeholders early include non-operational information domains in scope show early, useable results build model bottom-up, using standardised format (e.g. OODA-Loop) model first joint & combined processes not all services are services 33 Further research Suitability of DIVA methods & tools Suitability of C4I Architecture to support NEC transition Suitability of Service-Oriented Architecture to support info exchange between military & civil partners 34 17
18 35 18
Developing a C4I Architecture for the Netherlands Armed Forces
Developing a C4I Architecture for the Netherlands Armed Forces Dick Ooms (POC) & Tim Grant Netherlands Defence Academy (NLDA) P.O. Box 10000, 1780 CA Den Helder, The Netherlands Abstract - The purpose
More informationA joint approach to tactical data links The Swedish way
A joint approach to tactical data links The Swedish way LtCol Sigvard Wiss Joint C4I Systems Department Kristin Strömberg, Pgm Manager SW TDL Office, FMV SCOPE Operational Background Swedish TDL CONOPS
More informationManeuverable Web Architecture
Maneuverable Web Architecture Michael T. Nygard - Cognitect Thesis Thesis Agile dev works at micro scale Thesis Agile dev works at micro scale Won t create macro scale agility Maneuverability John Boyd
More informationJohn Snare Chair Standards Australia Committee IT/12/4
John Snare Chair Standards Australia Committee IT/12/4 ISO/IEC 27001 ISMS Management perspective Risk Management (ISO 31000) Industry Specific Standards Banking, Health, Transport, Telecommunications ISO/IEC
More informationUS Air Force Initiative to Enhance Hypersonic Test Capabilities
Air Force Materiel Command US Air Force Initiative to Enhance Hypersonic Test Capabilities Col Tim West Senior Materiel Leader, Test Ops Division Arnold Engineering Development Complex 32 nd Annual NDIA
More informationStrategic Objectives Defined Joint Operational Excellence Strategy to 2035 Our Mission: To secure New Zealand against external threat, to protect our sovereign interests, including in the Exclusive Economic
More informationDraft Cultural transformation the key to raising performance
Draft Cultural transformation the key to raising performance Leo Quinn, Chief Executive Officer UWE Bristol address 9 October 2014 1 QinetiQ 1940s 1991 2001 DERA 2006 Contribution Radar Jet engine VTOL
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior
More informationBreakout Session. James Martin Kevin Kreitman Jeff Diehl Scott Bernard
Breakout Session Exploring the Differences between Enterprise and System s A Look at the Different Methods, Tools, and Techniques James Martin Kevin Kreitman Jeff Diehl Scott Bernard Slide 1 Abstract Point:
More informationFinal Project Report. Abstract. Document information
Final Project Report Document information Project Title SWIM security solutions Project Number 14.02.02 Project Manager THALES Deliverable Name Final Project Report Deliverable ID D01 Edition 00.01.00
More informationCritical Information Infrastructure Protection Law
Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.
More informationSustainable Forest Management Toolbox
FAO OF THE UN Sustainable Forest Management Toolbox CONCEPT NOTE Draft version 3/10/2013 1. BACKGROUND There is renewed international recognition of Sustainable Forest Management (SFM) as an important
More informationICT and emergencies! in historic districts
ICT and emergencies! in historic districts (how ICT improves large scale emergency operations involving historical buildings) Stefano Marsella stefano.marsella@vigilfuoco.it Technical Rescue Operations
More informationCertification Management Application Tool for Aircraft Certification Management
Certification Management Application Tool for Aircraft Certification Management Ministerie van Defensie NLR - Dedicated to innovation in aerospace www.nlr.nl projectarea versioning area lookup tables 2
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationC2-Simulation Interoperability in NATO
C2-Simulation Interoperability in NATO Dr Hans Jense Chief, Capability Planning, Exercises and Training NATO UNCLASSIFIED 1 NATO CIS Services Agency NATO Consultation, Command and Control Agency NATO Air
More informationThe Beyond the Border Action Plan
The Beyond the Border Action Plan Updates on Key Initiatives Presentation at the Eastern Border Transportation Coalition (EBTC) Workshop April 19, 2016 The objective of this presentation is: To provide
More informationBattlespace Communications Architecture Development
Battlespace Communications Architecture Development Land Communications Reference Architecture Brief Mr Graeme Neil, Lead Architect, Joint Project 2072, DMO Electronic s Division Communications Branch
More informationEmerging Security Challenges November 22, 2012, Baku
Emerging Security Challenges November 22, 2012, Baku NATO ENSEC COE: planned activities and importance for NATO-South Caucasus cooperation DR. ARŪNAS MOLIS Chief of Research and Analysis Energy Security
More informationstandards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in
ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the
More informationFusión de datos. ISR & Data Fusion Capabilities
Fusión de datos ISR & Data Fusion Capabilities Amper at a glance Comprehensive technology solutions & business practices Continued investments in our capabilities & resources Increased operational efficiencies
More informationISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006
ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value
More informationSC27 WG4 Mission. Security controls and services
copyright ISO/IEC JTC 1/SC 27, 2012. This is an SC27 public document and is distributed as is for the sole purpose of awareness and promotion of SC 27 standards and so the text is not to be used for commercial
More informationDeployment is underway!
Deployment is underway! 15 September 2015 Scandic Hotel Roskilde, Denmark CODECS has received funding from the European Union s Horizon 2020 research and innovation programme under Grant Agreement No 653339.
More informationBCI Principles & Criteria: Revision
BCI Principles & Criteria: 2015-2017 Revision In January 2015 the BCI Council approved the proposal to launch a formal review of BCI s Principles & Criteria (P&C). This revision process provided an exciting
More informationICT & Battle-Space Networks
ICT & Battle-Space Networks Anant Mahajan, CIOG Considerations on ICT Architecture and Technology for Battle-Space Communication Presentation for MILCIS 2014 13 November 2014 Outline 1. Information and
More informationHow to supply to Defence (The 20 minute version)
How to supply to Defence (The 20 minute version) Defence Business Access Office Rod Kenafacke State Manager Victoria professionalise re-prioritise standardise benchmark improve industry relationships and
More informationProtecting information across government
Report by the Comptroller and Auditor General Cabinet Office Protecting information across government HC 625 SESSION 2016-17 14 SEPTEMBER 2016 4 Key facts Protecting information across government Key facts
More informationCoalition Interoperability Ontology:
Coalition Interoperability Ontology: Sharing Situational Awareness with Allies and Agents Erik Chaum Naval Undersea Warfare Center, Division Newport, TTCP, Maritime Systems Group, TP1 US National Leader
More informationDoD Strategy for Cyber Resilient Weapon Systems
DoD Strategy for Cyber Resilient Weapon Systems Melinda K. Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Systems Engineering Conference October 2016 10/24/2016 Page-1
More informationUKAS Guidance for Bodies Offering Certification of Anti-Bribery Management Systems
CIS 14 Edition 1 September 2018 UKAS Guidance for Bodies Offering Certification of Anti-Bribery Management Systems CIS 14 Edition 1 Page 1 of 10 Contents 1. Introduction 3 2. UKAS Assessment Approach 3
More informationAir Command and Control Programme Business Opportunities
1 Air Command and Control Programme Business Opportunities Enzo Montalti Director, Air C2 Programme Office and Services 2 NATO UNCLASSIFIED Contents AirC2 Programme & Service Financial Overview of the
More informationUNCLASSIFIED. ADF Tactical Data Link Authority Ground Network Capability Assurance Services UNCLASSIFIED
UNCLASSIFIED MilCIS 2013 TDL Stream, Session 2.5a ADF Tactical Data Link Authority Ground Network Capability Assurance Services Mr. Josh Roth Ground Networks Manager joshua.roth1@defence.gov.au 02 626
More informationTactical Microgrid Standardization Update to the EGSA Government Relations Committee
Tactical Microgrid Standards Consortium Tactical Microgrid Standardization Update to the EGSA Government Relations Committee Current as of 15 September 2017 US Army Engineer R&D Center (ERDC) US Army Communications-Electronics
More informationCurriculum for the Academy Profession Degree Programme in Multimedia Design & Communication National section. September 2014
Curriculum for the Academy Profession Degree Programme in Multimedia Design & Communication National section September 2014 1 Table of contents 1. Programme structure... 3 1.1 The programme is regulated
More informationTURNING STRATEGIES INTO ACTION DISASTER MANAGEMENT BUREAU STRATEGIC PLAN
DISASTER MANAGEMENT BUREAU STRATEGIC PLAN 2005-2006 PREFACE Historical statistics would suggest that Bangladesh is one of the most disaster prone countries in the world with the greatest negative consequences
More informationBAE SYSTEMS Developing Coalition Interoperability Marcus Krackowizer - September 2004
BAE SYSTEMS Developing Coalition Interoperability Marcus Krackowizer - September 2004 Today s Objectives Introduce the problem context and interdependencies. Discuss BAE SYSTEMS Position Review example
More informationBusiness Analysis in Practice
Business Analysis in Practice (Level 2 CCBA Certification Preparation Course) Duration: 3 days PM-Partners have been leaders in project management certification for 20 years, training over 8,500 industry
More informationNetwork Descriptions and NEC
ABSTRACT Jeroen van der Ham 1,2, Marko van Daal 3, Hans Keus 1 and Cees de Laat 2 1: TNO Defence, Security and Safety 2: University of Amsterdam 3: C2 Support Centre Corresponding author: vdham@science.uva.nl
More informationETSI Workshop ICT Energy Efficiency and Environmental Sustainability Latest projects and upcoming developments. Chiara Venturini Director, GeSI
ETSI Workshop ICT Energy Efficiency and Environmental Sustainability Latest projects and upcoming developments Chiara Venturini Director, GeSI Sophia Antipolis, 3 June 2015 About GeSI Who we are: a strategic
More informationNACE/AACE Western Regional Conference Laughlin, Nevada November 3, 2011
NACE/AACE Western Regional Conference Laughlin, Nevada November 3, 2011 Tim Psomas Chairman of the Board, ISI Institute for Sustainable Infrastructure Outline Background Development Features of Envision
More informationPrinciples for a National Space Industry Policy
Principles for a National Space Industry Policy Commonwealth of Australia 2011 DIISR 11/144 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced
More informationSpace and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)
Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) SSC Atlantic is part of the Naval Research & Development Establishment (NR&DE) Information Warfare Research Project
More informationStandard Operating Procedure. Data Collection and Validation. Public
Scope Special Requirements Process for receiving scientific data collections through the Data Collection Framework and for including data into the EFSA Scientific Data Warehouse. This procedure is a controlled
More informationAir Force Mission: Air Power for Australia s interests. Air Force Values: Respect Excellence Agility Dedication Integrity Teamwork
Air Force Vision: Air Force will provide the most rapid, effective and responsive military options for the Australian Government to achieve national objectives within our region and globally. Air Force
More informationUpdates to the NIST Cybersecurity Framework
Updates to the NIST Cybersecurity Framework NIST Cybersecurity Framework Overview and Other Documentation October 2016 Agenda: Overview of NIST Cybersecurity Framework Updates to the NIST Cybersecurity
More informationLevel 4 Diploma in Computing
Level 4 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that
More informationNATO Policy for Standardization
NATO Policy for Standardization 2018 International Standardization Workshop October 30 November 1, 2018 Tysons, Virginia - USA Lt. Cdr Nikolaos Myriounis GRC (N) NATO Standardization Manager Hellenic National
More informationThe Net-Enabled Future:
The Net-Enabled Future: An OCTANe Discussion Panel Topic Sheryl Sizelove, The Boeing Company Network Centric Operations Industry Consortium (NCOIC) 27 September 2006 Approved by Boeing Export. Authorization
More informationNCSF Foundation Certification
NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity
More informationAir Force Research Laboratory
Air Force Research Laboratory Emerging Command, Control, and Communications Technologies for the 3 rd Offset and Future Operating Concept AFCEA Luncheon 22 September 2016 Dr. Paul Antonik, ST Chief Scientist,
More informationUGANDA NATIONAL BUREAU OF STANDARDS LIST OF DRAFT UGANDA STANDARDS ON PUBLIC REVIEW
UGANDA NATIONAL BUREAU OF STANDARDS LIST OF DRAFT UGANDA STANDARDS ON PUBLIC REVIEW S/No. STANDARDS CODE TITLE(DESCRIPTION) SCOPE 1. DUS ISO/IEC 29151:2017 technology -- Security techniques -- Code of
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationMAWA Forum State of Play. Cooperation Planning & Support Henk Corporaal MAWA Forum Chair
MAWA Forum State of Play Cooperation Planning & Support Henk Corporaal MAWA Forum Chair Content Background MAWA Initiative Achievements and Status to date Future Outlook 2 Background MAWA Initiative The
More informationSMR Deployment Enablers
SMR Deployment Enablers Kris MacCrory Decision Analysis Services 2017 Energy Technologies Institute LLP - Subject to notes on page 1 Small Modular Reactor (SMR) Deployment Enablers Project Kris MacCrory
More informationHEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT
HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HCQI Expert Group Meeting 7-8 November 2013 Agenda to improve health information infrastructure» In 2010, health ministers called for improvement
More informationCenter of Excellence in Operational Analyses IPP-BAS
Center of Excellence in Operational Analyses IPP-BAS The Role of Computer Assisted Exercises as a Tool for Concept Development and Experimentation in Bulgarian Navy Transformation Dr. Velizar Shalamanov
More informationOSD Product Support BCA Guidebook. Joseph Colt Murphy Senior Financial Analyst ODASD Materiel Readiness 9 May 2011
OSD Product Support BCA Guidebook Joseph Colt Murphy Senior Financial Analyst ODASD Materiel Readiness 9 May 2011 Joseph.murphy@osd.mil Introduction Product Support BCA Guidebook Draft document Final review
More informationFinal Project Report. Abstract. Document information
Final Project Report Document information Project Title ATM Security Coordination and Support Project Number 16.06.02 Project Manager EUROCONTROL Deliverable Name Final Project Report Deliverable ID D100
More informationDeveloping a National Emergency Telecommunications Plan. The Samoan Experience November 2012
Developing a National Emergency Telecommunications Plan The Samoan Experience November 2012 What is The NETP? The National Emergency Telecoms Plan (NETP) is a strategic plan that establishes a national
More informationT2S PROGRAMME STATUS AS OF MID-SEPTEMBER
T2S PROGRAMME OFFICE ECB-PUBLIC AG Meeting 18/19 September 2012 Item 2 09.04.01/2012/007820 T2S PROGRAMME STATUS AS OF MID-SEPTEMBER 2012-1. Introduction In this note the T2S Programme Office provides
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationMINISTRY OF DEFENCE. MOD Architectural Framework Technical Handbook
MODAF-M07-022 MINISTRY OF DEFENCE MOD Architectural Framework Technical Handbook Version 1.0 31 August 2005 Prepared by:- Approved by:- MODAF Project Review Board CROWN COPYRIGHT 2005. THIS DOCUMENT IS
More information2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat
2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat Faye Francy Aviation ISAC February 2015 Company Organization Corporate Defense, Space & Security Boeing Capital Corporation
More informationThe CEO Water Mandate:
The CEO Water Mandate: 1) Managing Water in the Supply Chain 2) Transparency Stockholm, 21-22 August 2008 1 UN and Business: A Strengthening Partnership Business United Nations Growth & Returns Good Governance
More informationSEIS. (Shared Environmental Information System) From concept to information services
SEIS (Shared Environmental Information System) From concept to information services Stefan Jensen EEA supported by Sheila Cryan and Jon Maidens GSDI 11, Rotterdam 19.6.2009 What is SEIS is about... Sharing
More informationSession 7: Plenary Session. E-Strategy Paper
PERSIDANGAN KEBANGSAAN MENGENAI MASYARAKAT BERMAKLUMAT NATIONAL SUMMIT ON INFORMATION SOCIETY (NASIS) 7 8 SEPTEMBER 2005 INTERNATIONAL CONVENTION CENTER, BRUNEI DARUSSALAM Date of issue: 7 th September
More informationDHS Election Task Force Updates. Geoff Hale, Elections Task Force
1 DHS Election Task Force Updates Geoff Hale, Elections Task Force Geoffrey.Hale@hq.dhs.gov ETF Updates Where we ve made progress Services EI-ISAC/ National Cyber Situational Awareness Room What we ve
More informationModule 3. Overview of TOGAF 9.1 Architecture Development Method (ADM)
Module 3 Overview of TOGAF 9.1 Architecture Development Method (ADM) TOGAF 9.1 Structure The Architecture Development Method (ADM) Needs of the business shape non-architectural aspects of business operation
More informationOhio Supercomputer Center
Ohio Supercomputer Center Security Notifications No: Effective: OSC-10 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
More informationEarthquake Early Warning
Earthquake Early Warning 1 CISN California Integrated Seismic Network 2000 seismic station sites Seismic networks Information products Real-time/rapid products Detections, locations, magnitudes ShakeMaps
More informationPhysical Security Reliability Standard Implementation
Physical Security Reliability Standard Implementation Attachment 4b Action Information Background On March 7, 2014, the Commission issued an order directing NERC to submit for approval, within 90 days,
More informationStrategic and operational threat analysis at Europol's EC3
Strategic and operational threat analysis at Europol's EC3 Dr. Philipp Amann, MSc Senior Strategic Analyst Team Leader Strategy & Development ENISA Workshop on EU Threat Landscape Europol Unclassified
More informationAirport Security & Safety Thales, Your Trusted Hub Partner
Airport Security & Safety Thales, Your Trusted Hub Partner www.thalesgroup.com/shield Securing People Ensuring Business Continuity Protecting Assets Thales Credentials Thales is a leading international
More informationPurpose. ERO Enterprise-Endorsed Implementation Guidance
Lesson Learned CIP Version 5 Transition Program CIP-002-5.1 Requirement R1: Impact Rating of Generation Resource Shared BES Cyber Systems Version: January 29, 2015 Authorized by the Standards Committee
More informationExecutive Order & Presidential Policy Directive 21. Ed Goff, Duke Energy Melanie Seader, EEI
Executive Order 13636 & Presidential Policy Directive 21 Ed Goff, Duke Energy Melanie Seader, EEI Agenda Executive Order 13636 Presidential Policy Directive 21 Nation Infrastructure Protection Plan Cybersecurity
More informationChild Online Protection
Click to edit Master title style Child Online Protection What does that mean for Children in the Pacific Region? 1 Click Presentation to edit Master Overview title style Introduction Key areas of the Guidelines
More informationANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And
ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief
More informationVulnerability of C2 Networks to Attack: Measuring the topology of eleven Dutch Army C2 systems
16 TH ICCRTS Collective C2 in Multinational Civil-Military Operations Vulnerability of C2 Networks to Attack: Measuring the topology of eleven Dutch Army C2 systems Topic: Cyberspace Management T.J. Grant,
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 10 R-1 Line #218
COST ($ in Millions) Prior Years FY 2013 FY 2014 FY 2015 Base FY 2015 FY 2015 OCO # Total FY 2016 FY 2017 FY 2018 FY 2019 Office of Secretary Of Defense Page 1 of 10 R-1 Line #218 Cost To Complete Total
More informationQualification details
Qualification details Title New Zealand Certificate in Business (First Line Management) (Level 4) Version 1 Qualification type Certificate Level 4 Credits 60 NZSCED 080301 Management and Commerce > Business
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Auditor www.pecb.com The objective of the Certified ISO 22000 Lead Auditor examination is to ensure that the candidate has
More informationIndustrial Energy Efficiency
ABB Global Consulting, APW 2011, Orlando Industrial Energy Efficiency Metals Industry Case Study April 19, 2011 Slide 1 Introduction ABB Global Consulting Products Capability Industrial Energy Efficiency
More informationMODEL-DRIVEN DEVELOPMENT OF COMMAND AND CONTROL CAPABILITIES FOR JOINT AND COALITION WARFARE
9 TH International Command and Control Research & Technology Symposium MODEL-DRIVEN DEVELOPMENT OF COMMAND AND CONTROL CAPABILITIES FOR JOINT AND COALITION WARFARE Robert Jacobs Computer Systems Center
More informationNCSF Foundation Certification
NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity
More informationISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF
SEPTEMBER 2017 ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF STATE OF ISRAEL PRIME MINISTER S OFFICE NATIONAL CYBER DIRECTORATE Vision and Objective 5 Development of Israel s national cyber security
More informationThe NL C4ISR Architecture for Ground-Based Operations: Evolutionary Development of Network Enabled Capabilities
UNCLASSIFIED/UNLIMITED The NL C4ISR Architecture for Ground-Based Operations: Evolutionary Development of Network Enabled Capabilities Author: LtCol Msc. Dirk Jan Blaas Co-author: Theo Derksen Msc. RNLA
More informationDistributed Software Applications
Unit 40: Distributed Software Applications Unit code: M/601/1525 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with an understanding of the principles of distributed computing,
More informationENTERPRISE ARCHITECTURE FOR THE AIR FORCE SATELLITE CONTROL NETWORK
ENTERPRISE ARCHITECTURE FOR THE AIR FORCE SATELLITE CONTROL NETWORK Raul J. Diaz USAF, 50 th Network Operations Group, raul.diaz@us.af.mil ABSTRACT Our cultural expectation about technology continually
More informationC2-Simulation Interoperability in NATO
C2-Simulation Interoperability in NATO Dr Hans Jense Chief, Capability Planning, Exercises and Training NATO UNCLASSIFIED 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
More informationNATO and Military Partnerships
NATO and Military Partnerships Joni LINDEMAN, LTC/OF-4 (FIN A) SO/ICC/COI/MPD Bi-SC MPD 1 Aim and Outline Aim Provide an overview of NATO s partnership programs and the role of the Bi-SC Military Partnerships
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 20000 Lead Auditor www.pecb.com The objective of the Certified ISO/IEC 20000 Lead Auditor examination is to ensure that the candidate
More informationTransforming the NATO Alliance: NATO Network Enabled Capability Initiatives
Transforming the NATO Alliance: NATO Network Enabled Capability Initiatives Mr. J. Troy Turner Section Head, Interoperability Standardization & Architectures HQ SACT, C4I Division Aim of Presentation Describe
More informationFirst Science-Policy- Industry meeting on CBRN-E Introductory words. Philippe Quevauviller. Security Research and Industry. DG Enterprise and Industry
First Science-Policy- Industry meeting on CBRN-E Introductory words Brussels, 30 th January 2014 Philippe Quevauviller Security and Industry DG Enterprise and Industry FP7 CBRN- Where do we stand? Around
More informationData Collection and Incident Analysis: IT-ISAC Perspective. ENISA Workshop March 17, 2010
Data Collection and Incident Analysis: IT-ISAC Perspective ENISA Workshop March 17, 2010 Agenda IT-ISAC Overview ISAC Model with Case Studies (ISAC Initiatives and Conficker) Building a Joint Capability
More informationGuide to the implementation and auditing of ISMS controls based on ISO/IEC 27001
Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 Information Security Management Systems Guidance series The Information Security Management Systems (ISMS) series of books
More informationGREEN DEFENCE FRAMEWORK
GREEN DEFENCE FRAMEWORK Approved by the North Atlantic Council in February 2014 GREEN DEFENCE FRAMEWORK OVERVIEW 1. Green Defence could, at this stage, be defined as a multifaceted endeavour cutting across
More informationRequirements Driven Mediation for Collaborative Security. Amel Bennaceur The Open University, UK
Requirements Driven Mediation for Collaborative Security Amel Bennaceur The Open University, UK Collaborative Security Making multiple, heterogeneous, software intensive components collaborate in order
More informationUNCLASSIFIED FY 2016 OCO. FY 2016 Base
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology Development
More information9AIR CRS CONTROL & REPORTING SYSTEM
9AIR CRS CONTROL & REPORTING SYSTEM 9AIR CRS > ANY NEED ANY TASK ANY NEED ANY TASK The 9AIR C4I concept: complete control for all weapons, sensors and communications. The missions that air forces face
More information