Homeland Security Information Sharing Architecture

Size: px
Start display at page:

Download "Homeland Security Information Sharing Architecture"

Transcription

1 Homeland Security Information Sharing Architecture National Defense Industrial Association Interoperability and Systems Integration Conference 2 April 2003 William F. Dawson Deputy Intelligence Community Chief Information Officer 1

2 Agenda Objectives Approach Architecture Information Sharing Summary 2

3 Objectives Use existing capabilities and infrastructures to support the analytical and information dissemination needs of Homeland Security Provide actionable access to information Provide a roadmap for future system development which ensures interoperability across the Federal Government and beyond 3

4 Approach Interconnect a Homeland Security Community of Interest (COI) at each security level: Top Secret SCI Secret Collateral Sensitive but Unclassified (SBU) Establish a governance process at each security level: Policies Standards 4

5 IC Enterprise Architecture Intelligence Community System for Information Sharing (ICSIS) Provides the enterprise capabilities to store, manage and disseminate information using: Joint Worldwide Intelligence Communications System (JWICS) for Top Secret connectivity Secret Internet Protocol Routed Network (SIPRNET) for Secret connectivity Open Source Information System (OSIS) for Unclassified/SBU connectivity 5

6 IC Enterprise Architecture Intelligence Community System for Information Sharing (ICSIS) Provides the controlled interfaces to securely transfer data to analysts at lower security levels Provides a governance structure for sensitive compartmented information 6

7 Homeland Security Architecture IC Agencies IC PKI provides Identification and authentication for COI users. SCI COI SCI Community Space Servers/ Apps Collaboration Shared Data COI SECRET COI IC PKI CRL Common Services CA Collaboration Servers/ Apps Unclass COI Shared Data Collaboration Servers/ Apps Shared Data COI Controlled Interface Controlled Enables transfer of Interface Data from SCI To Collateral Intelink-SCollateral Space Collateral PKI PKI Space COI Controlled Interface DoD PKI provides Identification and authentication for COI users. SCI Network (JWICS) Controlled Interface Enables transfer of Data from Collateral To Sensitive Commercial PKI provides Identification and authentication for COI users. Sensitive Space PKI Collateral Network (SIPRNET) Unclassified Network (OSIS) 7

8 Sharing Sensitive Compartmented Information TS/SCI Infrastructure Managed by the Intelligence Community Takes full advantage of the existing ICSIS and Comms infrastructure CT-Link provides an existing operational Secure Community of Interest: Profiled cable/message reports/traffic Community products (Warnings, Assessments) Community databases Examples: State, FBI, CIA, etc. Tailored Forums (bulletin boards) 8

9 Sharing Collateral Information Collateral Infrastructure Managed by Defense Department (and others) Takes full advantage of the DoD s existing Secret infrastructure Takes full advantage of Secret version of Intelink Communities of Interest for Homeland Security can be established One department (e.g., Defense) could lead a governance activity 9

10 Sharing Unclassified Information Sensitive but Unclassified Infrastructure Managed by Department of Homeland Security (and others) Takes full advantage of the existing Federal Government infrastructure, including DOJ/FBI s Law Enforcement Networks DoD s Unclassified Networks State s SBU Networks IC s Unclassified Networks Communities of Interest for Homeland Security can be established One Department (e.g., D) could lead a governance activity 10

11 Homeland Security Information Sharing Information Flow Data Participants Governance TOP SECRET Sources and Methods Sensitive Data Actionable Data Foreign Intelligence IC Analysts IC Business Rules Controlled Interface SECRET Business Rules Controlled Interface UNCLASS /SBU Existing Capabilities Classified Information Actionable Data Actionable Data Unclassified Reporting and Feedback Military and other Secret Level Law Enforcement and Domestic DoD Operators LE and Domestic Agencies DoD + D + Emerging Capabilities 11

12 Summary Existing operational capabilities and IT infrastructures can and are being leveraged to support the analytical and information dissemination needs of D Actionable information and connectivity is required at three distinct security levels Coordinated governance processes will facilitate timely exchange of Homeland Security information 12

Intelligence Community Communications Architecture

Intelligence Community Communications Architecture Intelligence Community Communications Architecture National Defense Industrial Association Interoperability and Systems Integration Conference 2 April 2003 UNCLASSIFIED William F. Dawson Deputy Intelligence

More information

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED

More information

National Counterterrorism Center

National Counterterrorism Center National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate

More information

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This Statement for the Record of The Honorable Michael E. Leiter Director, National Counterterrorism Center on Information Sharing with State, Local, and Tribal Authorities before the House Committee on Homeland

More information

Android Team Awareness Kit (ATAK) and ArcGIS

Android Team Awareness Kit (ATAK) and ArcGIS Android Team Awareness Kit (ATAK) and ArcGIS Darron Pustam Product Manager, Esri Craig Cleveland Product Engineer, Esri Verne LaClair Product Manager, PAR Agenda Connecting Intel and Operations in Real

More information

DoD Mobility briefing for the AFCEA Mobility Summit

DoD Mobility briefing for the AFCEA Mobility Summit For Official Use Only DoD Mobility briefing for the AFCEA Mobility Summit Mr. Randall Conway Principal Deputy, Deputy Chief Information Officer, Information Enterprise US Department of Defense January

More information

California Cybersecurity Integration Center (Cal-CSIC)

California Cybersecurity Integration Center (Cal-CSIC) California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine

More information

Louisiana - State Analytical & Fusion Exchange (LA-SAFE)

Louisiana - State Analytical & Fusion Exchange (LA-SAFE) Louisiana - State Analytical & Fusion Exchange (LA-SAFE) Mission Statement The Louisiana State Analytical and Fusion Exchange (LA-SAFE) promotes collaboration in an all-crimes/all-hazards environment,

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Mapping The Network Mapping helps visualize the network and understand relationships and connectivity between

More information

CYBER ASSISTANCE TEAM OVERVIEW BRIEFING

CYBER ASSISTANCE TEAM OVERVIEW BRIEFING CYBER ASSISTANCE TEAM OVERVIEW BRIEFING By Mr. Derek Fleischmann Cyber Assistance Team Missile Defense Agency May 16, 2018 Agenda Introduction MDA CAT Operations MDA CAT Deployment Expectations Administrative

More information

Department of Defense Fiscal Year (FY) 2013 IT President's Budget Request Defense Technical Information Center Overview

Department of Defense Fiscal Year (FY) 2013 IT President's Budget Request Defense Technical Information Center Overview Mission Area Department of Defense Business System Breakout Appropriation All Other Resources 19.083 EIEMA 19.083 RDT&E 19.083 FY 2013 ($M) FY 2013 ($M) FY 2013 ($M) FY12 to FY13 Comparision ($M) FY2012

More information

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous

More information

Securing Content in the Department of Defense s Global Information Grid

Securing Content in the Department of Defense s Global Information Grid Securing Content in the Department of Defense s Global Information Grid Secure Knowledge Workshop State University of New York - Buffalo 23-24 September 2004 Robert W. McGraw Technical Director IA Architecture

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Defense Security Service Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development COST

More information

NATIONAL INFORMATION SHARING STRATEGY

NATIONAL INFORMATION SHARING STRATEGY The Federal Bureau of Investigation NATIONAL INFORMATION SHARING STRATEGY August 2008 August 2008 1 PURPOSE The Federal Bureau of Investigation (FBI) National Information Sharing Strategy (NISS) provides

More information

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal

More information

ROADMAP TO DFARS COMPLIANCE

ROADMAP TO DFARS COMPLIANCE ROADMAP TO DFARS COMPLIANCE ARE YOU READY FOR THE 12/31/17 DEADLINE? In our ebook, we have answered the most common questions we receive from companies preparing for DFARS compliance. Don t risk terminated

More information

Multi-National Information Sharing Briefing

Multi-National Information Sharing Briefing Multi-National Information Sharing Briefing AFCEA TechNet Mr. Donald Parker DISA Multinational Information Sharing (MNIS) Division 2 Nov 2017 Current DISA-Managed Coalition Information Sharing Systems

More information

OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE INTELLIGENCE COMMUNITY POLICY MEMORANDUM NUMBER

OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE INTELLIGENCE COMMUNITY POLICY MEMORANDUM NUMBER OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE INTELLIGENCE COMMUNITY POLICY MEMORANDUM NUMBER 2007-500-3 SUBJECT: (U) INTELLIGENCE INFORMATION SHARING A. AUTHORITY: The National Security Act of 1947,

More information

The U.S. Coast Guard s Role in Cybersecurity

The U.S. Coast Guard s Role in Cybersecurity The U.S. Coast Guard s Role in Cybersecurity Mr. Thomas P. Michelli Deputy Chief Information Officer U.S. Coast Guard What is Cyberspace? Domain characterized by the use of electronics and the electromagnetic

More information

DoD Mobility Mobility Product Security Certification Processes

DoD Mobility Mobility Product Security Certification Processes DoD Mobility Mobility Product Security Certification Processes Greg Youst DISA Chief Mobility Engineer 25 May 2017 Agenda DoD Mobility Unclassified Mobility Certification Process Main DoD Approved Product

More information

Risk Management Framework for DoD Medical Devices

Risk Management Framework for DoD Medical Devices Risk Management Framework for DoD Medical Devices Session 136, March 7, 2018 Lt. Col. Alan Hardman, Chief Operations Officer, Cyber Security Division, Office of the DAD IO/J-6 William Martin, Deputy of

More information

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

Good morning, Chairman Harman, Ranking Member Reichert, and Members of Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,

More information

Architecture in the Intelligence Community

Architecture in the Intelligence Community Architecture in the Intelligence Community DoD Enterprise Architecture Conference, June 2009 1 Topics Environment Joint Systems Engineering Forum (JSEF) Joint Architecture Reference Model (JARM) Exercising

More information

All Source Intelligence Environment (Alien)

All Source Intelligence Environment (Alien) DRAFT Defense Intelligence Agency All Source Intelligence Environment (Alien) An Interoperability Framework Supporting Joint Vision 2020 Functional User s Guide DRAFT 28 September 2006 Version 0.6 DRAFT

More information

JRSS. GPIs MNIS DMCC-S. Assured Identity NBIS. Joint Regional Security Stacks. Global Private Internets. Multinational Information Sharing

JRSS. GPIs MNIS DMCC-S. Assured Identity NBIS. Joint Regional Security Stacks. Global Private Internets. Multinational Information Sharing SummerLook 2018Book JRSS Joint Regional Security Stacks GPIs Global Private Internets MNIS Multinational Information Sharing DMCC-S DOD Mobility Classified Capability - Secret Assured Identity NBIS National

More information

This Conference brought to you by

This Conference brought to you by This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com Current Processes and Challenges with Operational

More information

The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse

The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse Stephen Hunt OSD CAPE Joint Data Support (SAIC) Stephen.Hunt.ctr@osd.mil The DoD Office of Security Review has cleared this report

More information

National Strategy for CBRNE Standards

National Strategy for CBRNE Standards National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS IA Policies, Procedures, The Information Assurance (IA) Policies, Procedures, encompasses existing policies, procedures,

More information

Integrated Cyber Defense Working Group (ICD WG) Introduction

Integrated Cyber Defense Working Group (ICD WG) Introduction Integrated Cyber Defense Working Group (ICD WG) Introduction Cory Huyssoon Allison Cline October 16, 2017 2017 by The Johns Hopkins Applied Physics Laboratory. Material is made available under the Creative

More information

Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) SDSFIE Metadata (SDSFIE-M): Implementation Guidance

Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) SDSFIE Metadata (SDSFIE-M): Implementation Guidance Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) SDSFIE Metadata (SDSFIE-M): Implementation Guidance Version 1.0 (8 SEP 2015) Prepared By: The IGI&S Governance Group (IGG)

More information

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP) To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

Defensive Cyber Operations Industry Overview 3 APR 18

Defensive Cyber Operations Industry Overview 3 APR 18 Defensive Cyber Operations Industry Overview 3 APR 18 LTC Scott Helmore UNCLASSIFIED Introduction Welcome Transforming I3C2 to DCO Themes: Innovation Secure Communications Collaboration WWII was won with

More information

NIST Special Publication

NIST Special Publication NIST Special Publication 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Ryan Bonner Brightline WHAT IS INFORMATION SECURITY? Personnel Security

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Access Management Access management enforces the policies that define the actions that an entity may or may not perform

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

Department of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Prisoner of War/Missing Personnel Office (DPMO) Overview

Department of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Prisoner of War/Missing Personnel Office (DPMO) Overview Mission Area Department of Defense Business System Breakout Appropriation All Other Resources 3.200 EIEMA 3.200 FY 2014 ($M) FY 2014 ($M) OPERATIONS 3.200 FY 2014 ($M) FY13 to FY14 Comparison ($M) FY2013

More information

Integrated Wireless Network (IWN) Industry Day April 27, 2004

Integrated Wireless Network (IWN) Industry Day April 27, 2004 (IWN) Industry Day April 27, 2004 (IWN) Industry Day April 27, 2004 Sean Thrash Director, Wireless Management Office Office of the Chief Information Officer Department of Homeland Security IWN INDUSTRY

More information

OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA

OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA 22041-3206 TRICARE MANAGEMENT ACTIVITY MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT:

More information

Published Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).

Published Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA). This document is scheduled to be published in the Federal Register on 03/22/2012 and available online at http://federalregister.gov/a/2012-06847, and on FDsys.gov 9110-9L DEPARTMENT OF HOMELAND SECURITY

More information

Service-Oriented Architecture for Command and Control Systems with Dynamic Reconfiguration

Service-Oriented Architecture for Command and Control Systems with Dynamic Reconfiguration Service-Oriented Architecture for Command and Control Systems with Dynamic Reconfiguration Raymond A. Paul Department of Defense Washington, DC raymond.paul@osd.mil 2004-5-22 1 Outlines Motivation Dynamic

More information

DISN Forecast to Industry. Ms. Cindy E. Moran Director for Network Services 8 August 2008

DISN Forecast to Industry. Ms. Cindy E. Moran Director for Network Services 8 August 2008 DISN Forecast to Industry Ms. Cindy E. Moran Director for Network Services 8 August 2008 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information

More information

Moving Data through Early Planning into Design and Operations

Moving Data through Early Planning into Design and Operations Moving Data through Early Planning into Design and Operations Stephen R Hagan FAIA Kimon Onuma FAIA Russell Manning Federal Facilities Council U.S. Department of Agriculture Agricultural Research U.S.

More information

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated

More information

Private Sector Clearance Program (PSCP) Webinar

Private Sector Clearance Program (PSCP) Webinar Private Sector Clearance Program (PSCP) Webinar Critical Infrastructure Protection Committee November 18, 2014 Nathan Mitchell, ESCC Clearance Liaison Agenda History NERC CIPC Private Sector Clearance

More information

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

Alaska Land Mobile Radio Communications Planning and AS/NE 07 Readiness and Support. Alaskan Command J6 Mr. Timothy Woodall July 20, 2006

Alaska Land Mobile Radio Communications Planning and AS/NE 07 Readiness and Support. Alaskan Command J6 Mr. Timothy Woodall July 20, 2006 Alaska Land Mobile Radio Communications Planning and AS/NE 07 Readiness and Support Alaskan Command J6 Mr. Timothy Woodall July 20, 2006 Agenda Purpose Background Drivers Project Goals, Deliverables, and

More information

Cloud-based Open Architecture Approach for Common Enterprise Ground Services

Cloud-based Open Architecture Approach for Common Enterprise Ground Services Cloud-based Open Architecture Approach for Common Enterprise Ground Services GSAW Conference Feb. 29-March 3, 2016 2016 by Booz Allen Hamilton. Published by The Aerospace Corporation with permission. Agenda

More information

The National Network of Fusion Center: Where We Have Been and Where We are Going

The National Network of Fusion Center: Where We Have Been and Where We are Going The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National

More information

Critical Infrastructure Sectors and DHS ICS CERT Overview

Critical Infrastructure Sectors and DHS ICS CERT Overview Critical Infrastructure Sectors and DHS ICS CERT Overview Presented by Darryl E. Peek II REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM 2 2 Authorities and Related Legislation Homeland Security

More information

Genesis 1. He did not give Man dominion over Man

Genesis 1. He did not give Man dominion over Man Genesis 1 In the beginning God created the heavens and the earth. God said, Let there be light,, and there was light. On the sixth day God created Man and gave Man dominion over the earth. He did not give

More information

Jim Brenton Regional Security Coordinator ERCOT Electric Reliability Council of Texas

Jim Brenton Regional Security Coordinator ERCOT Electric Reliability Council of Texas Jim Brenton Regional Security Coordinator ERCOT Electric Reliability Council of Texas Facts expressed in this presentation are Facts Opinions express in this presentation are solely my own The voices I

More information

Guidance and Policy For Department of Defense (DoD) Global Information Grid (GIG) Computing

Guidance and Policy For Department of Defense (DoD) Global Information Grid (GIG) Computing 1 2 Guidance and Policy For Department of Defense (DoD) Global Information Grid (GIG) Computing References: (a) DoD Chief Information Officer (CIO) Guidance and Policy Memorandum No.-8001-March 31, 2000-Global

More information

Presentation Title 11/13/2013

Presentation Title 11/13/2013 Enable Secure Information Sharing Right Data-Right People-Right Time MILCIS 2013 George Kamis RTCS Chief Technology Officer Kamis@TrustedCS.com +1 703-537-4310 EXIM Approval #IIS2013-268 Copyright 2013

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

GridEx IV Initial Lessons Learned and Resilience Initiatives

GridEx IV Initial Lessons Learned and Resilience Initiatives GridEx IV Initial Lessons Learned and Resilience Initiatives LeRoy T. Bunyon, MBA, CBCP Sr. Lead Analyst, Business Continuity 2017 GridEx IV GridEx is a NERC-sponsored, North American grid resilience exercise

More information

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.

More information

PIPELINE SECURITY An Overview of TSA Programs

PIPELINE SECURITY An Overview of TSA Programs PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the

More information

5 th Annual Identity Management Symposium

5 th Annual Identity Management Symposium Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates

More information

and The Technical Assist Database Presented to the Regional GIS Council October 8, 2008

and The Technical Assist Database Presented to the Regional GIS Council October 8, 2008 and The Technical Assist Database Presented to the Regional GIS Council October 8, 2008 After the catastrophic wildfires of October 2003, the San Diego Regional Fire Prevention and Emergency Preparedness

More information

DoD Identity & Access Management (IdAM) Portfolio Overview

DoD Identity & Access Management (IdAM) Portfolio Overview DoD Identity & Access Management (IdAM) Portfolio Overview UNCLASSIFIED DISA Enterprise Services Directorate (ESD) 17 July 2013 Overview IdAM Concepts & IdAM Portfolio 7/15/13 UNCLASSIFIED 1 IdAM Overview

More information

The Net-Enabled Future:

The Net-Enabled Future: The Net-Enabled Future: An OCTANe Discussion Panel Topic Sheryl Sizelove, The Boeing Company Network Centric Operations Industry Consortium (NCOIC) 27 September 2006 Approved by Boeing Export. Authorization

More information

Cloud Managed Services for Government (CMSG) A secure strategy for the Department of Defense at an IBM-operated, Level 5, DoD Facility

Cloud Managed Services for Government (CMSG) A secure strategy for the Department of Defense at an IBM-operated, Level 5, DoD Facility A secure strategy for the Department of Defense at an IBM-operated, Level 5, DoD Facility IBM provides end-to-end strategy, migration, infrastructure and managed services on secure government premises

More information

4th Annual. Multi-INT Exploitation Summit

4th Annual. Multi-INT Exploitation Summit Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary

More information

Geospatial Management Office (GMO) U.S. DEPARTMENT OF HOMELAND SECURITY OFFICE OF THE CHIEF INFORMATION OFFICER (OCIO)

Geospatial Management Office (GMO) U.S. DEPARTMENT OF HOMELAND SECURITY OFFICE OF THE CHIEF INFORMATION OFFICER (OCIO) Geospatial Management Office (GMO) U.S. DEPARTMENT OF HOMELAND SECURITY OFFICE OF THE CHIEF INFORMATION OFFICER (OCIO) 1 Agenda What We (GMO) Do Core Offerings Geospatial Information Infrastructure (GII)

More information

Department of Homeland Security Geospatial Management Office (GMO) NSGIC Midyear Update

Department of Homeland Security Geospatial Management Office (GMO) NSGIC Midyear Update Department of Homeland Security Geospatial Management Office (GMO) NSGIC Midyear Update CDR Kurt Clarke February 24 th 2016 DHS COP Program Manager Office of the Chief Information Officer Geospatial Management

More information

Panel 1 National CSIRT Experience

Panel 1 National CSIRT Experience Panel 1 National CSIRT Experience 2 nd Meeting of Government Cybersecurity Practitioners Sao Paulo, Brazil September 14-16, 2005 Andrew McAllister Senior Advisor, Cyber Security Public Safety and Emergency

More information

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University

More information

PKI and FICAM Overview and Outlook

PKI and FICAM Overview and Outlook PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies

More information

Statement for the Record. before the Senate Homeland Security and Governmental Affairs Committee

Statement for the Record. before the Senate Homeland Security and Governmental Affairs Committee Statement for the Record before the Senate Homeland Security and Governmental Affairs Committee "Information Sharing in the Era of WikiLeaks: Balancing Security and Collaboration" Statement of Kshemendra

More information

NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly.

NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly. NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly. Dunlap@Raytheon.com This document does not contain technology or Technical Data controlled

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

More information

Status Update from the Department of Transportation

Status Update from the Department of Transportation U.S. Department of Transportation Office of the Secretary Status Update from the Department of Transportation Michael Lowder, Director Office of Intelligence, Security & Emergency Response General Both

More information

Secure Desktop KVM Switch Update. Keep classified information classified.

Secure Desktop KVM Switch Update. Keep classified information classified. Secure Desktop KVM Switch Update Keep classified information classified. Introduction Until recently, the National Information Assurance Partnership (NIAP) used Common Criteria Evaluation & Validation

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess

More information

Health Information Technology - Supporting Joint Readiness

Health Information Technology - Supporting Joint Readiness Health Information Technology - Supporting Joint Readiness Session # 104, March 7, 2018 Mr. T. Pat Flanders, DADIO/J-6, CIO Kevin P. Seeley, Deputy CIO, Colonel, USAF, MSC 1 Speaker Introduction Pat Flanders

More information

DHS INTELLIGENCE ANALYSIS. Additional Actions Needed to Address Analytic Priorities and Workforce Challenges

DHS INTELLIGENCE ANALYSIS. Additional Actions Needed to Address Analytic Priorities and Workforce Challenges United States Government Accountability Office Congressional Requesters June 2014 DHS INTELLIGENCE ANALYSIS Additional Actions Needed to Address Analytic Priorities and Workforce Challenges GAO-14-397

More information

Better Mutual Authentication Project

Better Mutual Authentication Project Better Mutual Authentication Project Recommendations & Requirements for Improving Web Authentication for Retail Financial Services Presented to W3C Workshop on: Transparency & Usability of Web Authentication

More information

SAC PA Security Frameworks - FISMA and NIST

SAC PA Security Frameworks - FISMA and NIST SAC PA Security Frameworks - FISMA and NIST 800-171 June 23, 2017 SECURITY FRAMEWORKS Chris Seiders, CISSP Scott Weinman, CISSP, CISA Agenda Compliance standards FISMA NIST SP 800-171 Importance of Compliance

More information

Five-Year Strategic Plan

Five-Year Strategic Plan Five-Year Strategic Plan 2016 2020 Contents A Message from the ERIS Board... 3 Introduction and Background... 4 Five-Year Plan Goal Areas... 7 Goal Area 1: State Environmental Agency Research Needs and

More information

Defense Strategies Institute cordially invites you to an educational and training Summit:

Defense Strategies Institute cordially invites you to an educational and training Summit: Defense Strategies Institute cordially invites you to an educational and training Summit: Improving all- source intelligence and operational capabilities in a joint environment January 31 February 1, 2017:

More information

TESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE)

TESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) TESTIMONY OF MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) BEFORE THE HOUSE JUDICIARY COMMITTEE FEDERAL GOVERNMENT

More information

Homeland Security Enterprise (HSE) Geospatial Concept of Operations (GeoCONOPS)

Homeland Security Enterprise (HSE) Geospatial Concept of Operations (GeoCONOPS) Homeland Security Enterprise (HSE) Geospatial Concept of Operations (GeoCONOPS) U.S. Department of Homeland Security Information Sharing and Services Office (IS 2 O) Office of the Chief Information Officer

More information

DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1

DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 MISSION-DRIVEN SOLUTIONS 2018 INTEGRATED INTEL SOLUTIONS ALL RIGHTS RESERVED MISSION-DRIVEN SOLUTIONS

More information

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS THE WHITE HOUSE Office of the Press Secretary EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical

More information

ISOO CUI Overview for ACSAC

ISOO CUI Overview for ACSAC ISOO CUI Overview for ACSAC Briefing Outline ISOO Overview Overview of the CUI Program CUI and IT Implementation CUI and NIST Standards and Guidelines NIST SP 800-171 CUI Approach for the Contractor Environment

More information

Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form

Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form Page 1 of 5 Submitted to DISA s DoD Cloud Support Office by: Signature (Prefer CAC

More information

High Assurance Platform (HAP) High Assurance Challenges. Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009

High Assurance Platform (HAP) High Assurance Challenges. Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009 High Assurance Platform (HAP) High Assurance Challenges Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009 What is HAP? HAP is being developed to provide users with two primary

More information

Defining Computer Security Incident Response Teams

Defining Computer Security Incident Response Teams Defining Computer Security Incident Response Teams Robin Ruefle January 2007 ABSTRACT: A computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that

More information

Recherche et développement pour la défense Canada. Centre des sciences pour la sécurité 222, rue Nepean, 11ième étage Ottawa, Ontario K1A 0K2

Recherche et développement pour la défense Canada. Centre des sciences pour la sécurité 222, rue Nepean, 11ième étage Ottawa, Ontario K1A 0K2 Defence Research and Development Canada Centre for Security Science 222 Nepean Street, 11 th floor Ottawa, Ontario K1A 0K2 Recherche et développement pour la défense Canada Centre des sciences pour la

More information

3. Execution. Commanders will ensure that this policy is read and adhered to by all personnel.

3. Execution. Commanders will ensure that this policy is read and adhered to by all personnel. UNITED STATES MARINE CORPS MARINE CORPS AIR STATION IWAKUNI, JAPAN PSC 561 BOX 1861 FPO AP 96310-0019 IN REPLY REFER TO: MCASO 5510.1 S-6 MARINE CORPS AIR STATION ORDER 5510.1 From: Commanding Officer,

More information

Coalition C2/Multinational Information Sharing: Current Capabilities and Challenges

Coalition C2/Multinational Information Sharing: Current Capabilities and Challenges Coalition C2/Multinational Information Sharing: Current Capabilities and Challenges 16 th International Command and Control Research and Technology Symposium (ICCRTS) June 21-23, 2011 Mr. Ronald W. Pontius

More information

Cloud Overview. Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 UNITED IN SERVICE TO OUR NATION UNCLASSIFIED 1

Cloud Overview. Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 UNITED IN SERVICE TO OUR NATION UNCLASSIFIED 1 Cloud Overview Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 1 DoD Cloud Deployment Models DoDIN On-Premise Commercial Cloud Commercially provided cloud service hosted within DoD facilities

More information

DHS ID & CREDENTIALING INITIATIVE IPT MEETING

DHS ID & CREDENTIALING INITIATIVE IPT MEETING DHS ID & CREDENTIALING INITIATIVE IPT MEETING October 14, 2004 Part 02 of 02 IMS/CMS Functional Specification General Issuance Requirements Issue a GSC-IS 2.1 compliant dual chip hybrid ICC/DESFire v0.5

More information