Homeland Security Information Sharing Architecture
|
|
- Morris Bond
- 6 years ago
- Views:
Transcription
1 Homeland Security Information Sharing Architecture National Defense Industrial Association Interoperability and Systems Integration Conference 2 April 2003 William F. Dawson Deputy Intelligence Community Chief Information Officer 1
2 Agenda Objectives Approach Architecture Information Sharing Summary 2
3 Objectives Use existing capabilities and infrastructures to support the analytical and information dissemination needs of Homeland Security Provide actionable access to information Provide a roadmap for future system development which ensures interoperability across the Federal Government and beyond 3
4 Approach Interconnect a Homeland Security Community of Interest (COI) at each security level: Top Secret SCI Secret Collateral Sensitive but Unclassified (SBU) Establish a governance process at each security level: Policies Standards 4
5 IC Enterprise Architecture Intelligence Community System for Information Sharing (ICSIS) Provides the enterprise capabilities to store, manage and disseminate information using: Joint Worldwide Intelligence Communications System (JWICS) for Top Secret connectivity Secret Internet Protocol Routed Network (SIPRNET) for Secret connectivity Open Source Information System (OSIS) for Unclassified/SBU connectivity 5
6 IC Enterprise Architecture Intelligence Community System for Information Sharing (ICSIS) Provides the controlled interfaces to securely transfer data to analysts at lower security levels Provides a governance structure for sensitive compartmented information 6
7 Homeland Security Architecture IC Agencies IC PKI provides Identification and authentication for COI users. SCI COI SCI Community Space Servers/ Apps Collaboration Shared Data COI SECRET COI IC PKI CRL Common Services CA Collaboration Servers/ Apps Unclass COI Shared Data Collaboration Servers/ Apps Shared Data COI Controlled Interface Controlled Enables transfer of Interface Data from SCI To Collateral Intelink-SCollateral Space Collateral PKI PKI Space COI Controlled Interface DoD PKI provides Identification and authentication for COI users. SCI Network (JWICS) Controlled Interface Enables transfer of Data from Collateral To Sensitive Commercial PKI provides Identification and authentication for COI users. Sensitive Space PKI Collateral Network (SIPRNET) Unclassified Network (OSIS) 7
8 Sharing Sensitive Compartmented Information TS/SCI Infrastructure Managed by the Intelligence Community Takes full advantage of the existing ICSIS and Comms infrastructure CT-Link provides an existing operational Secure Community of Interest: Profiled cable/message reports/traffic Community products (Warnings, Assessments) Community databases Examples: State, FBI, CIA, etc. Tailored Forums (bulletin boards) 8
9 Sharing Collateral Information Collateral Infrastructure Managed by Defense Department (and others) Takes full advantage of the DoD s existing Secret infrastructure Takes full advantage of Secret version of Intelink Communities of Interest for Homeland Security can be established One department (e.g., Defense) could lead a governance activity 9
10 Sharing Unclassified Information Sensitive but Unclassified Infrastructure Managed by Department of Homeland Security (and others) Takes full advantage of the existing Federal Government infrastructure, including DOJ/FBI s Law Enforcement Networks DoD s Unclassified Networks State s SBU Networks IC s Unclassified Networks Communities of Interest for Homeland Security can be established One Department (e.g., D) could lead a governance activity 10
11 Homeland Security Information Sharing Information Flow Data Participants Governance TOP SECRET Sources and Methods Sensitive Data Actionable Data Foreign Intelligence IC Analysts IC Business Rules Controlled Interface SECRET Business Rules Controlled Interface UNCLASS /SBU Existing Capabilities Classified Information Actionable Data Actionable Data Unclassified Reporting and Feedback Military and other Secret Level Law Enforcement and Domestic DoD Operators LE and Domestic Agencies DoD + D + Emerging Capabilities 11
12 Summary Existing operational capabilities and IT infrastructures can and are being leveraged to support the analytical and information dissemination needs of D Actionable information and connectivity is required at three distinct security levels Coordinated governance processes will facilitate timely exchange of Homeland Security information 12
Intelligence Community Communications Architecture
Intelligence Community Communications Architecture National Defense Industrial Association Interoperability and Systems Integration Conference 2 April 2003 UNCLASSIFIED William F. Dawson Deputy Intelligence
More informationCyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation
Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED
More informationNational Counterterrorism Center
National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate
More informationUNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This
Statement for the Record of The Honorable Michael E. Leiter Director, National Counterterrorism Center on Information Sharing with State, Local, and Tribal Authorities before the House Committee on Homeland
More informationAndroid Team Awareness Kit (ATAK) and ArcGIS
Android Team Awareness Kit (ATAK) and ArcGIS Darron Pustam Product Manager, Esri Craig Cleveland Product Engineer, Esri Verne LaClair Product Manager, PAR Agenda Connecting Intel and Operations in Real
More informationDoD Mobility briefing for the AFCEA Mobility Summit
For Official Use Only DoD Mobility briefing for the AFCEA Mobility Summit Mr. Randall Conway Principal Deputy, Deputy Chief Information Officer, Information Enterprise US Department of Defense January
More informationCalifornia Cybersecurity Integration Center (Cal-CSIC)
California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine
More informationLouisiana - State Analytical & Fusion Exchange (LA-SAFE)
Louisiana - State Analytical & Fusion Exchange (LA-SAFE) Mission Statement The Louisiana State Analytical and Fusion Exchange (LA-SAFE) promotes collaboration in an all-crimes/all-hazards environment,
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Mapping The Network Mapping helps visualize the network and understand relationships and connectivity between
More informationCYBER ASSISTANCE TEAM OVERVIEW BRIEFING
CYBER ASSISTANCE TEAM OVERVIEW BRIEFING By Mr. Derek Fleischmann Cyber Assistance Team Missile Defense Agency May 16, 2018 Agenda Introduction MDA CAT Operations MDA CAT Deployment Expectations Administrative
More informationDepartment of Defense Fiscal Year (FY) 2013 IT President's Budget Request Defense Technical Information Center Overview
Mission Area Department of Defense Business System Breakout Appropriation All Other Resources 19.083 EIEMA 19.083 RDT&E 19.083 FY 2013 ($M) FY 2013 ($M) FY 2013 ($M) FY12 to FY13 Comparision ($M) FY2012
More informationDefense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility
Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous
More informationSecuring Content in the Department of Defense s Global Information Grid
Securing Content in the Department of Defense s Global Information Grid Secure Knowledge Workshop State University of New York - Buffalo 23-24 September 2004 Robert W. McGraw Technical Director IA Architecture
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Defense Security Service Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development COST
More informationNATIONAL INFORMATION SHARING STRATEGY
The Federal Bureau of Investigation NATIONAL INFORMATION SHARING STRATEGY August 2008 August 2008 1 PURPOSE The Federal Bureau of Investigation (FBI) National Information Sharing Strategy (NISS) provides
More informationCritical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division
Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal
More informationROADMAP TO DFARS COMPLIANCE
ROADMAP TO DFARS COMPLIANCE ARE YOU READY FOR THE 12/31/17 DEADLINE? In our ebook, we have answered the most common questions we receive from companies preparing for DFARS compliance. Don t risk terminated
More informationMulti-National Information Sharing Briefing
Multi-National Information Sharing Briefing AFCEA TechNet Mr. Donald Parker DISA Multinational Information Sharing (MNIS) Division 2 Nov 2017 Current DISA-Managed Coalition Information Sharing Systems
More informationOFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE INTELLIGENCE COMMUNITY POLICY MEMORANDUM NUMBER
OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE INTELLIGENCE COMMUNITY POLICY MEMORANDUM NUMBER 2007-500-3 SUBJECT: (U) INTELLIGENCE INFORMATION SHARING A. AUTHORITY: The National Security Act of 1947,
More informationThe U.S. Coast Guard s Role in Cybersecurity
The U.S. Coast Guard s Role in Cybersecurity Mr. Thomas P. Michelli Deputy Chief Information Officer U.S. Coast Guard What is Cyberspace? Domain characterized by the use of electronics and the electromagnetic
More informationDoD Mobility Mobility Product Security Certification Processes
DoD Mobility Mobility Product Security Certification Processes Greg Youst DISA Chief Mobility Engineer 25 May 2017 Agenda DoD Mobility Unclassified Mobility Certification Process Main DoD Approved Product
More informationRisk Management Framework for DoD Medical Devices
Risk Management Framework for DoD Medical Devices Session 136, March 7, 2018 Lt. Col. Alan Hardman, Chief Operations Officer, Cyber Security Division, Office of the DAD IO/J-6 William Martin, Deputy of
More informationGood morning, Chairman Harman, Ranking Member Reichert, and Members of
Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,
More informationArchitecture in the Intelligence Community
Architecture in the Intelligence Community DoD Enterprise Architecture Conference, June 2009 1 Topics Environment Joint Systems Engineering Forum (JSEF) Joint Architecture Reference Model (JARM) Exercising
More informationAll Source Intelligence Environment (Alien)
DRAFT Defense Intelligence Agency All Source Intelligence Environment (Alien) An Interoperability Framework Supporting Joint Vision 2020 Functional User s Guide DRAFT 28 September 2006 Version 0.6 DRAFT
More informationJRSS. GPIs MNIS DMCC-S. Assured Identity NBIS. Joint Regional Security Stacks. Global Private Internets. Multinational Information Sharing
SummerLook 2018Book JRSS Joint Regional Security Stacks GPIs Global Private Internets MNIS Multinational Information Sharing DMCC-S DOD Mobility Classified Capability - Secret Assured Identity NBIS National
More informationThis Conference brought to you by
This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com Current Processes and Challenges with Operational
More informationThe Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse
The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse Stephen Hunt OSD CAPE Joint Data Support (SAIC) Stephen.Hunt.ctr@osd.mil The DoD Office of Security Review has cleared this report
More informationNational Strategy for CBRNE Standards
National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS IA Policies, Procedures, The Information Assurance (IA) Policies, Procedures, encompasses existing policies, procedures,
More informationIntegrated Cyber Defense Working Group (ICD WG) Introduction
Integrated Cyber Defense Working Group (ICD WG) Introduction Cory Huyssoon Allison Cline October 16, 2017 2017 by The Johns Hopkins Applied Physics Laboratory. Material is made available under the Creative
More informationSpatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) SDSFIE Metadata (SDSFIE-M): Implementation Guidance
Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) SDSFIE Metadata (SDSFIE-M): Implementation Guidance Version 1.0 (8 SEP 2015) Prepared By: The IGI&S Governance Group (IGG)
More informationTERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)
To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationDefensive Cyber Operations Industry Overview 3 APR 18
Defensive Cyber Operations Industry Overview 3 APR 18 LTC Scott Helmore UNCLASSIFIED Introduction Welcome Transforming I3C2 to DCO Themes: Innovation Secure Communications Collaboration WWII was won with
More informationNIST Special Publication
NIST Special Publication 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Ryan Bonner Brightline WHAT IS INFORMATION SECURITY? Personnel Security
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Access Management Access management enforces the policies that define the actions that an entity may or may not perform
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationDepartment of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Prisoner of War/Missing Personnel Office (DPMO) Overview
Mission Area Department of Defense Business System Breakout Appropriation All Other Resources 3.200 EIEMA 3.200 FY 2014 ($M) FY 2014 ($M) OPERATIONS 3.200 FY 2014 ($M) FY13 to FY14 Comparison ($M) FY2013
More informationIntegrated Wireless Network (IWN) Industry Day April 27, 2004
(IWN) Industry Day April 27, 2004 (IWN) Industry Day April 27, 2004 Sean Thrash Director, Wireless Management Office Office of the Chief Information Officer Department of Homeland Security IWN INDUSTRY
More informationOFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA
OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA 22041-3206 TRICARE MANAGEMENT ACTIVITY MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT:
More informationPublished Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).
This document is scheduled to be published in the Federal Register on 03/22/2012 and available online at http://federalregister.gov/a/2012-06847, and on FDsys.gov 9110-9L DEPARTMENT OF HOMELAND SECURITY
More informationService-Oriented Architecture for Command and Control Systems with Dynamic Reconfiguration
Service-Oriented Architecture for Command and Control Systems with Dynamic Reconfiguration Raymond A. Paul Department of Defense Washington, DC raymond.paul@osd.mil 2004-5-22 1 Outlines Motivation Dynamic
More informationDISN Forecast to Industry. Ms. Cindy E. Moran Director for Network Services 8 August 2008
DISN Forecast to Industry Ms. Cindy E. Moran Director for Network Services 8 August 2008 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information
More informationMoving Data through Early Planning into Design and Operations
Moving Data through Early Planning into Design and Operations Stephen R Hagan FAIA Kimon Onuma FAIA Russell Manning Federal Facilities Council U.S. Department of Agriculture Agricultural Research U.S.
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationPrivate Sector Clearance Program (PSCP) Webinar
Private Sector Clearance Program (PSCP) Webinar Critical Infrastructure Protection Committee November 18, 2014 Nathan Mitchell, ESCC Clearance Liaison Agenda History NERC CIPC Private Sector Clearance
More informationRocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency
Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationUNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationAlaska Land Mobile Radio Communications Planning and AS/NE 07 Readiness and Support. Alaskan Command J6 Mr. Timothy Woodall July 20, 2006
Alaska Land Mobile Radio Communications Planning and AS/NE 07 Readiness and Support Alaskan Command J6 Mr. Timothy Woodall July 20, 2006 Agenda Purpose Background Drivers Project Goals, Deliverables, and
More informationCloud-based Open Architecture Approach for Common Enterprise Ground Services
Cloud-based Open Architecture Approach for Common Enterprise Ground Services GSAW Conference Feb. 29-March 3, 2016 2016 by Booz Allen Hamilton. Published by The Aerospace Corporation with permission. Agenda
More informationThe National Network of Fusion Center: Where We Have Been and Where We are Going
The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National
More informationCritical Infrastructure Sectors and DHS ICS CERT Overview
Critical Infrastructure Sectors and DHS ICS CERT Overview Presented by Darryl E. Peek II REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM 2 2 Authorities and Related Legislation Homeland Security
More informationGenesis 1. He did not give Man dominion over Man
Genesis 1 In the beginning God created the heavens and the earth. God said, Let there be light,, and there was light. On the sixth day God created Man and gave Man dominion over the earth. He did not give
More informationJim Brenton Regional Security Coordinator ERCOT Electric Reliability Council of Texas
Jim Brenton Regional Security Coordinator ERCOT Electric Reliability Council of Texas Facts expressed in this presentation are Facts Opinions express in this presentation are solely my own The voices I
More informationGuidance and Policy For Department of Defense (DoD) Global Information Grid (GIG) Computing
1 2 Guidance and Policy For Department of Defense (DoD) Global Information Grid (GIG) Computing References: (a) DoD Chief Information Officer (CIO) Guidance and Policy Memorandum No.-8001-March 31, 2000-Global
More informationPresentation Title 11/13/2013
Enable Secure Information Sharing Right Data-Right People-Right Time MILCIS 2013 George Kamis RTCS Chief Technology Officer Kamis@TrustedCS.com +1 703-537-4310 EXIM Approval #IIS2013-268 Copyright 2013
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationGridEx IV Initial Lessons Learned and Resilience Initiatives
GridEx IV Initial Lessons Learned and Resilience Initiatives LeRoy T. Bunyon, MBA, CBCP Sr. Lead Analyst, Business Continuity 2017 GridEx IV GridEx is a NERC-sponsored, North American grid resilience exercise
More information2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.
More informationPIPELINE SECURITY An Overview of TSA Programs
PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the
More information5 th Annual Identity Management Symposium
Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates
More informationand The Technical Assist Database Presented to the Regional GIS Council October 8, 2008
and The Technical Assist Database Presented to the Regional GIS Council October 8, 2008 After the catastrophic wildfires of October 2003, the San Diego Regional Fire Prevention and Emergency Preparedness
More informationDoD Identity & Access Management (IdAM) Portfolio Overview
DoD Identity & Access Management (IdAM) Portfolio Overview UNCLASSIFIED DISA Enterprise Services Directorate (ESD) 17 July 2013 Overview IdAM Concepts & IdAM Portfolio 7/15/13 UNCLASSIFIED 1 IdAM Overview
More informationThe Net-Enabled Future:
The Net-Enabled Future: An OCTANe Discussion Panel Topic Sheryl Sizelove, The Boeing Company Network Centric Operations Industry Consortium (NCOIC) 27 September 2006 Approved by Boeing Export. Authorization
More informationCloud Managed Services for Government (CMSG) A secure strategy for the Department of Defense at an IBM-operated, Level 5, DoD Facility
A secure strategy for the Department of Defense at an IBM-operated, Level 5, DoD Facility IBM provides end-to-end strategy, migration, infrastructure and managed services on secure government premises
More information4th Annual. Multi-INT Exploitation Summit
Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary
More informationGeospatial Management Office (GMO) U.S. DEPARTMENT OF HOMELAND SECURITY OFFICE OF THE CHIEF INFORMATION OFFICER (OCIO)
Geospatial Management Office (GMO) U.S. DEPARTMENT OF HOMELAND SECURITY OFFICE OF THE CHIEF INFORMATION OFFICER (OCIO) 1 Agenda What We (GMO) Do Core Offerings Geospatial Information Infrastructure (GII)
More informationDepartment of Homeland Security Geospatial Management Office (GMO) NSGIC Midyear Update
Department of Homeland Security Geospatial Management Office (GMO) NSGIC Midyear Update CDR Kurt Clarke February 24 th 2016 DHS COP Program Manager Office of the Chief Information Officer Geospatial Management
More informationPanel 1 National CSIRT Experience
Panel 1 National CSIRT Experience 2 nd Meeting of Government Cybersecurity Practitioners Sao Paulo, Brazil September 14-16, 2005 Andrew McAllister Senior Advisor, Cyber Security Public Safety and Emergency
More informationAn Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)
An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University
More informationPKI and FICAM Overview and Outlook
PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies
More informationStatement for the Record. before the Senate Homeland Security and Governmental Affairs Committee
Statement for the Record before the Senate Homeland Security and Governmental Affairs Committee "Information Sharing in the Era of WikiLeaks: Balancing Security and Collaboration" Statement of Kshemendra
More informationNDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly.
NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly. Dunlap@Raytheon.com This document does not contain technology or Technical Data controlled
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour
More informationStatus Update from the Department of Transportation
U.S. Department of Transportation Office of the Secretary Status Update from the Department of Transportation Michael Lowder, Director Office of Intelligence, Security & Emergency Response General Both
More informationSecure Desktop KVM Switch Update. Keep classified information classified.
Secure Desktop KVM Switch Update Keep classified information classified. Introduction Until recently, the National Information Assurance Partnership (NIAP) used Common Criteria Evaluation & Validation
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess
More informationHealth Information Technology - Supporting Joint Readiness
Health Information Technology - Supporting Joint Readiness Session # 104, March 7, 2018 Mr. T. Pat Flanders, DADIO/J-6, CIO Kevin P. Seeley, Deputy CIO, Colonel, USAF, MSC 1 Speaker Introduction Pat Flanders
More informationDHS INTELLIGENCE ANALYSIS. Additional Actions Needed to Address Analytic Priorities and Workforce Challenges
United States Government Accountability Office Congressional Requesters June 2014 DHS INTELLIGENCE ANALYSIS Additional Actions Needed to Address Analytic Priorities and Workforce Challenges GAO-14-397
More informationBetter Mutual Authentication Project
Better Mutual Authentication Project Recommendations & Requirements for Improving Web Authentication for Retail Financial Services Presented to W3C Workshop on: Transparency & Usability of Web Authentication
More informationSAC PA Security Frameworks - FISMA and NIST
SAC PA Security Frameworks - FISMA and NIST 800-171 June 23, 2017 SECURITY FRAMEWORKS Chris Seiders, CISSP Scott Weinman, CISSP, CISA Agenda Compliance standards FISMA NIST SP 800-171 Importance of Compliance
More informationFive-Year Strategic Plan
Five-Year Strategic Plan 2016 2020 Contents A Message from the ERIS Board... 3 Introduction and Background... 4 Five-Year Plan Goal Areas... 7 Goal Area 1: State Environmental Agency Research Needs and
More informationDefense Strategies Institute cordially invites you to an educational and training Summit:
Defense Strategies Institute cordially invites you to an educational and training Summit: Improving all- source intelligence and operational capabilities in a joint environment January 31 February 1, 2017:
More informationTESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE)
TESTIMONY OF MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) BEFORE THE HOUSE JUDICIARY COMMITTEE FEDERAL GOVERNMENT
More informationHomeland Security Enterprise (HSE) Geospatial Concept of Operations (GeoCONOPS)
Homeland Security Enterprise (HSE) Geospatial Concept of Operations (GeoCONOPS) U.S. Department of Homeland Security Information Sharing and Services Office (IS 2 O) Office of the Chief Information Officer
More informationDELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1
DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 MISSION-DRIVEN SOLUTIONS 2018 INTEGRATED INTEL SOLUTIONS ALL RIGHTS RESERVED MISSION-DRIVEN SOLUTIONS
More informationTHE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS
THE WHITE HOUSE Office of the Press Secretary EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical
More informationISOO CUI Overview for ACSAC
ISOO CUI Overview for ACSAC Briefing Outline ISOO Overview Overview of the CUI Program CUI and IT Implementation CUI and NIST Standards and Guidelines NIST SP 800-171 CUI Approach for the Contractor Environment
More informationDefense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form
Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form Page 1 of 5 Submitted to DISA s DoD Cloud Support Office by: Signature (Prefer CAC
More informationHigh Assurance Platform (HAP) High Assurance Challenges. Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009
High Assurance Platform (HAP) High Assurance Challenges Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009 What is HAP? HAP is being developed to provide users with two primary
More informationDefining Computer Security Incident Response Teams
Defining Computer Security Incident Response Teams Robin Ruefle January 2007 ABSTRACT: A computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that
More informationRecherche et développement pour la défense Canada. Centre des sciences pour la sécurité 222, rue Nepean, 11ième étage Ottawa, Ontario K1A 0K2
Defence Research and Development Canada Centre for Security Science 222 Nepean Street, 11 th floor Ottawa, Ontario K1A 0K2 Recherche et développement pour la défense Canada Centre des sciences pour la
More information3. Execution. Commanders will ensure that this policy is read and adhered to by all personnel.
UNITED STATES MARINE CORPS MARINE CORPS AIR STATION IWAKUNI, JAPAN PSC 561 BOX 1861 FPO AP 96310-0019 IN REPLY REFER TO: MCASO 5510.1 S-6 MARINE CORPS AIR STATION ORDER 5510.1 From: Commanding Officer,
More informationCoalition C2/Multinational Information Sharing: Current Capabilities and Challenges
Coalition C2/Multinational Information Sharing: Current Capabilities and Challenges 16 th International Command and Control Research and Technology Symposium (ICCRTS) June 21-23, 2011 Mr. Ronald W. Pontius
More informationCloud Overview. Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 UNITED IN SERVICE TO OUR NATION UNCLASSIFIED 1
Cloud Overview Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 1 DoD Cloud Deployment Models DoDIN On-Premise Commercial Cloud Commercially provided cloud service hosted within DoD facilities
More informationDHS ID & CREDENTIALING INITIATIVE IPT MEETING
DHS ID & CREDENTIALING INITIATIVE IPT MEETING October 14, 2004 Part 02 of 02 IMS/CMS Functional Specification General Issuance Requirements Issue a GSC-IS 2.1 compliant dual chip hybrid ICC/DESFire v0.5
More information