Pacific Air Forces. I n t e g r i t y - S e r v i c e - E x c e l l e n c e Trans-Pacific Enterprise GIS Implementation for the Pacific Air Forces
|
|
- Lewis Poole
- 6 years ago
- Views:
Transcription
1 Pacific Air Forces Trans-Pacific Enterprise GIS Implementation for the Pacific Air Forces Geo Integration Office HQ PACAF/CEOG As of: 1
2 PACAF Area of Responsibility PACAF s area of responsibility extends from Alaska through Hawaii, to the U.S. Territories of Guam and Diego Garcia. It encompasses everything from the West coast of the Americas to the East coast of Africa. In total, PACAF s area of responsibility crosses 16 time zones, is home to roughly 60 percent of the world's population, and covers half of the earth s surface. The people of this region speak over 1,000 languages and dialects and are spread throughout 43 countries and 30 territories. As of: 2
3 Defining GeoBase A Transformational Program Innovative Sharing of Geospatial Installation Knowledge Across the Combat Support Spectrum An Information Superiority Tool One Installation Map Delivering Current Situational Awareness via the Network through Information Teaming An Agile Combat Support Enabler Supports Basing Needs in Peace & War Parallels Battlespace Intelligence Mission Infusion is the Aim, Not IT Acquisition/Implementation As of: 3
4 USAF GeoBase Vision One Installation One Map As of: 4
5 USAF GeoBase ConOps Garrison GeoBase One installation one map for all base planning and operations Expeditionary Site Mapping (GeoReach) Advance knowledge of FOL Minimizing basing risk Establish one installation one map forward Strategic GeoBase Support SAF/HAF Analysis BRAC, Homeland Security, Airspace & Ranges As of: 5
6 Previous Mapping Strategy: Functional IT Perspective Map v 3.0 CITS/CIPS IRPIMS ACES Map v 2.0 Map v 4.0 TBMCS-UL ASHS Map v 1.0 FPC2/IBDSS Map v 5.0 Map v 6.0 As of: Integrity - Service - Excellence 6
7 GeoBase Integration Strategy: MAJCOM Perspective HQ PACAF GIO Team HQ ACC GIO Team HQ AMC GIO Team HQ AFMC GIO Team HQ USAFE GIO Team HQ AFRC GIO Team HQ AFSPC GIO Team HQ AETC GIO Team MAJCOM GIOs Guide Acquisition and Sustainment of Common Installation Pictures Per GeoBase Architecture For All USAF/DOD Missions HQ ANG GIO Team HQ AFSOC GIO Team HQ USAFA GIO Team 11 th WG GIO Team As of: 7
8 GeoBase Integration Strategy: Functional Mission Perspective AF/XI AF/XOF AF/SE AF/XIC AF/ILE AF/ILE HQ PACAF GIO HQ ACC GIO HQ AMC GIO HQ AFMC GIO HQ USAFE GIO HQ AFRC GIO HQ AFSPC GIO HQ AETC GIO HQ ANG GIO HQ AFSOC GIO HQ USAFA GIO TBMCS UL FOA GeoBase Contractor Teams with Functional IT Implementation Staff to Interface with Common GeoBase Architecture FPC2/IBDSS ASHS CITS/GCSS ACES IRPIMS 11 th WG GIO C2 AFC2ISRC GIO AT/FP AFSFC GIO SAFETY AFSC GIO COMM 38EIG GIO CIVIL ENGR AFCESA GIO ENV MGT AFCEE GIO As of: 8
9 PACAF GIO Team CY04 As of: 9
10 PACAF GeoBase Timeline : Concept & strategic foundations : Data development : Adoption of spiral development strategy Initial design of spiral capabilities via PACAF GeoBase Spiral Development Plan GeoBase Enterprise Architecture (HAF GIO) Jan : Certification & Accreditation process 2004: Technology acquisition Training Spiral Two/Three deployment As of: 10
11 PACAF GeoBase Policy Framework HAF GeoBase Enterprise Architecture Garrison Mapping Concept of Operations Expeditionary Site Mapping Concept of Operations PACAF GeoBase Strategic Plan GeoBase Spiral Development Plan GeoBase Configuration Management Plan As of: 11
12 PACAF GeoBase Tasks & Tools Geo Integration Office (GIO) Mission Essential Tasks Develop, maintain, and deliver Common Installation Picture (CIP) & Regional Installation Picture (RIP) Host and deliver Mission Data Set (MDS) Customer service Training & technology transfer Reduce duplication of effort Reduce stovepipe solutions Broaden dissemination GeoBase Tools in PACAF Contingency Aircraft Parking Planner (CAPP) Base Engineer Survey Toolkit (GeoBEST) GeoBase Toolkit Defensor Fortis As of: 12
13 PACAF GeoBase Evolution Spiral One Installation GIOs at all PACAF Main Operating Bases and certain higher headquarters CIP replaces C-Tab (base map) RIP & MDS provide thematic information Geospatial Technologies (GIS, GPS, and image processing) Spiral Two (Currently Deploying) Oracle 9i ArcSDE 8.3 Spiral Three (Currently Deploying) Internet Information Services (IIS) 5 Intranet Map Server (IMS) As of: 13
14 Reasons for Adoption Command standardization Senior leadership knows what is available across the command and can expect a consistent product Easy data transfer to higher headquarters (NAF, PACAF, HAF) All program dimensions contained under one roof Applications portability Model reflects/facilitates program growth As of: 14
15 Certification & Accreditation DITSCAP DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Establishes a standard DOD-wide process, set of activities, general tasks, and a management structure to certify and accredit Information Systems (IS) that will maintain the Information Assurance (IA) and security posture of the Defense Information Infrastructure (DII) throughout the life cycle of the system. DITSCAP is a process for managing risk 4 Phases (Sys. Def, Verification, Validation and Reaccreditation) Confusing and seems to be poorly understood and applied by most Relevant Documents DoD Instruction (DITSCAP), ASD Signature 30 Dec 97 DoD M (DITSCAP Application Manual), ASD Signature 31 Jul 00 As of: 15
16 Certification & Accreditation DITSCAP (Key components) Preparation and submission of an SSAA Adequately describes the system and its components Adequately addresses security requirements and security measures in place Includes diagrams that adequately reflect the system s architecture and location Security Test and Evaluation (ST&E) Assess implementation of security design Ascertain that CIAA are implemented as documented in SSAA and perform properly Validate correct implementation of Identification & Authentication, Audits, Access Controls, Object Reuse, Trusted Recovery, and Network Connection Rule Compliance Evaluate system conformance w/reqs, mission, and architecture as defined in SSAA As of: 16
17 Certification & Accreditation SSAA System Security Authorization Agreement (SSAA) Used to help apply the DITSCAP process. Guides the System through the DITSCAP process. Defines operating environment of system Identifies the system Defines risks and countermeasures Helps documents agreement among DAA, user, & ISSO on how risk will be managed As of: 17
18 Certification & Accreditation Key components of an SSAA SSAA (cont d) System Identification (name, description, mission, etc.) Environment Description (location, physical security, etc.) System Architecture (interfaces, external connections, vulnerabilities/countermeasures, and data flow) System security requirement (data classifications, CM, and relevant instructions) Organizations and resources DITSCAP Plan (lifecycle maintenance, schedules, and roles/responsibilities) As of: 18
19 Certification & Accreditation C4ISP Provides a mechanism to raise and resolve program implementation issues related to C4I infrastructure requirements Identifies dependencies and interface requirements between systems early in the acquisition process Enables addressing interoperability, supportability and sufficiency concerns Aids in the Certificate of Networthiness (CoN) As of: 19
20 Spiral Two/Three Hardware HP ML570 G2 (1) Database Server 72GB SCSI hard drives (4) (Two Raid 1+0 volumes) 1.5GHZ XEON processors (2-4) 8GB RAM Dual gigabit NIC Emulex 64bit 133Mhz 2GB HBA LC (2) HP Proliant DL380-G3 (1-3) Spatial Server 36GB SCSI hard drives (2) (One Raid 1+0 volume) 2.8GHZ XEON processors (2) 2GB RAM Gigabit NIC HP Procurve 8 port switch 10/100/1000 Integrated keyboard drawer w/keyboard & trackball 8 port KVM switch Compaq rack 42U As of: 20
21 Spiral Two/Three Software Spiral Two ArcSDE 8.3 Oracle 9i SDS 2.3 Spiral Three ArcIMS IIS 5.0 Tomcat ASP HTML HTTPS/SSL Microsoft Access As of: 21
22 Spiral Two/Three Garrison GeoBase (Network Perspective) External Organizations DISN WAN HAF/SAF Firewall Strategic GeoBase UNCLASS GeoBase Applications ArcGIS Client (GeoBase Toolkit) GeoBEST CAPP Defensor Fortis Web Browser Any NIPRNet Client Installation LAN (NIPRNet) Mission Data Sets CE SF ArcGIS Client ArcGIS Client ArcGIS Client Trimble CORS SE NIPRNet SAN GDM Enterprise Geodatabase Base Network Control Center GeoBase Database Server Win2K SP 4 ArcSDE 8.3 Oracle 9i GeoBase Intranet Map Server Win2K SP 4 ArcIMS IIS 5 ArcGIS Client CIP / RIP Production MDS Hosting GeoBase Service Assurance Training & Technology Transfer Base Geo Integration Office - CE As of: 22
23 Geodatabase Schema PACAF utilizes the Spatial Data Standard for Facilities, Infrastructure, and Environment (SDSFIE) Geodatabase model combined with the ArcSDE repository Do not have to reinvent the wheel Adheres to the Keep It Simple (KIS) principle Ready made tools Can be implemented in any GIS or CAD mapping system Provides an integrated model of multi-thematic data content standards As of: 23
24 SDSFIE Data Model Five Primary Sections: Entity Sets - Broad grouping for data management Entity Classes - Grouping of data within each Entity Set Entity Types - Grouping of items appearing graphically on a map or drawing Attribute Tables - A relational database table containing non-graphic information, or attribute data, providing information about a map feature Domain Tables - Contains lists of valid or permissible values for specific attributes in an Attribute Table As of: 24
25 SDSFIE Data Model Entity Set Entity Class Entity Type Attribute Domain Utilities Water System Natural Gas Wastewater Drain Sump Grease Trap Septic Tank Capacity Age Composition Concrete Fiberglass Steel As of: 25
26 Deployment Tasks Rack and cable servers Connect power Install operating systems Install Ghost images Connect to LAN (Join Domain)** Oracle configuration ArcSDE configuration IIS configuration ArcIMS configuration ISS and base lockdowns Red indicates the need for help from base Network Control Center** As of: 26
27 Deployment Tasks (cont d) Load Spiral One data into Spiral Two database Test ArcSDE/ArcIMS configuration Demonstrate ArcSDE/ArcIMS functionality Demonstrate ArcSDE admin practices Demonstrate ArcIMS admin practices Remap MXD s to ArcSDE layers Build and serve ArcIMS map services Review Oracle/ArcSDE Review IIS/ArcSDE Troubleshoot As of: 27
28 Deployment Schedule Hickam (October 03) Eielson (April 04) Elmendorf (April 04) Andersen (May 04) Osan (June 04) Kunsan (June 04) Yokota (July 04) Misawa (August 04) Kadena (August 04) As of: 28
29 Lessons Learned The C&A/DITSCAP process is cumbersome, extremely confusing, poorly understood, poorly defined, and poorly implemented STIGS (lockdowns) if completely implemented system becomes useless Ghost images need to be perfect Hardware configurations (it s always something) Power is a consistent problem across PACAF Data often does not readily load into SDSFIE 2.3 geodatabase model PACAF has rolled out Z-values often have not been addressed Data often is not rolled up into a single Personal GDB Wildcards always expect the unexpected As of: 29
30 Future Direction Coordinate future integration with other Automated Information Systems Beta test future software releases of core architecture PACAF GIO will guide the linkage from the web-based Base General Plans (BGP) to GeoBase IMS (Spiral Three) Continue to steer the command toward a common technical architecture and database model Work toward automated database rollup from the bases to HQ PACAF Continue to engage the DITSCAP and C&A processes Embed technical architecture review into staff assistance visits As of: 30
31 SDSFIE Compliance Previous guidance was based on advanced level of compliance Addition of custom fields Addition of domain attributes Addition of custom feature classes PACAF collects anomalies and submits to HAF All non-sdsfie fields now contained in external tables Use available domain values Non-SDSFIE feature classes appended with four letter installation code Map correct feature to correct SDSFIE feature class Do not combine separate features into one feature class As of: 31
32 Contact Information Randal Brownell DSN Comm E Street, Suite D-306 Hickam AFB, HI As of: 32
USAF Environmental Management System Update
Headquarters U.S. Air Force USAF Environmental Management System Update Maj Aaron Altwies HQ USAF/A7CAQ Why do EMS? EO 13423 mandates it Requires Fully implemented EMSs by Dec 2008 Audited by external
More informationAMC/A6 Communication Mission Dataset
AMC/A6 Communication Mission Dataset 11 October 2007 SAME Mid-Atlantic Regional Conference Jeff Swallow Background FY05 to FY06 HQ AMC/A6 made a strategic investment in the mapping of Communications infrastructure
More informationApproaching Data Quality
USAF 2004 GeoBase Compass Conference 18 Aug 2004 Approaching Data Quality Mr. Nathan Lowry HQ AFSPC/CEXI AFSPC GIO Approaching Data Quality Overview DoD Standards and Flexibility Extending Standards to
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such
More informationNaval I. nstallation Restoration I nformation Solution. Innovation Leadership Performance
Naval I nstallation Restoration I nformation Solution Innovation Leadership Performance Navy's Solution for Environmental Restoration Data Management 2007 JSEM Josh Fortenberry (805) 982-4990 Naval Facilities
More informationStreamlined FISMA Compliance For Hosted Information Systems
Streamlined FISMA Compliance For Hosted Information Systems Faster Certification and Accreditation at a Reduced Cost IT-CNP, INC. WWW.GOVDATAHOSTING.COM WHITEPAPER :: Executive Summary Federal, State and
More informationGEOFidelis Program Update
GEOFidelis Program Update JSEM & Geospatial Conference Columbus, OH 22 May 2007 Organization Secretary of the Navy CNO CMC GEOFidelis Program Office MCI NCR MCI East MCRD ERR MCI West MCRD WRR MCI Mid
More informationDoD Information Technology Security Certification and Accreditation Process (DITSCAP) A presentation by Lawrence Feinstein, CISSP
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) A presentation by Lawrence Feinstein, CISSP April 14, 2004 Current Macro Security Context within the Federal Government
More informationHeadquarters U.S. Air Force
Headquarters U.S. Air Force Natural Infrastructure Management Data Tool Session #3864 Major Aaron Altweis HQ Air Force/A7CA Tom Welch Booz Allen Hamilton NIM Data Tool Background and Vision for the Tool
More informationDEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND Joint Interoperability Test Command (JTE) 26 Mar 13
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 IN REPLY REFER TO: Joint Interoperability Test Command (JTE) 26 Mar 13 MEMORANDUM FOR DISTRIBUTION SUBJECT: Extension of
More informationUS Air Force Programs
Air Force Civil Engineer Center US Air Force Programs Col Scott A. Warner, P.E. AFCEC/CFP 13 May 2015 Overview Air Force Civil Engineer Center MILCON Sustainment, Restoration and Modernization Business
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationSupporting the Army Enterprise with ESRI and Citrix
Supporting the Army Enterprise with ESRI and Citrix Julie Carter, Geospatial Engineer Installation Geospatial Information and Services (IGI&S) Program Office of the Assistant Chief of Staff for Installation
More informationSmart Data Center Solutions
Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,
More informationLanier Environmental Consultants
Lanier Environmental Consultants Providing environmental and planning services to protect the Air Force Mission and the Environment P.O. Box 241562 Montgomery, Alabama 36124 1562 334 430 1130 jlanier@lecllc.com
More informationMoving Data through Early Planning into Design and Operations
Moving Data through Early Planning into Design and Operations Stephen R Hagan FAIA Kimon Onuma FAIA Russell Manning Federal Facilities Council U.S. Department of Agriculture Agricultural Research U.S.
More informationIntroduction to AWS GoldBase
Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document
More informationGEOFidelis SDSFIE Implementation Roles and Responsibilities Guide
GEOFidelis SDSFIE Implementation Roles and Responsibilities Guide Version: 1.4 Prepared for: USMC Installation Geospatial Information and Services Program (GEOFidelis) November 19th, 2012 TABLE OF CONTENTS
More informationSecurity Management Models And Practices Feb 5, 2008
TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related
More informationAdvancing Sustainment through Public-Private Partnership
Air Force Sustainment Center Advancing Sustainment through Public-Private Partnership Mr. Earl Williams AFSC/LGXB 21 August 2017 Version 1 1 Overview Public-Private Partnerships Public-Private Partnerships
More informationFedRAMP: Understanding Agency and Cloud Provider Responsibilities
May 2013 Walter E. Washington Convention Center Washington, DC FedRAMP: Understanding Agency and Cloud Provider Responsibilities Matthew Goodrich, JD FedRAMP Program Manager US General Services Administration
More informationACC GeoBase Web Administration
Headquarters Air Combat Command ACC GeoBase Web Administration This Briefing is: UNCLASSIFIED Michael Cannon Web Administrator FED UC A7ZG 22 Feb 08 Overview Old System Architecture Challenges Current
More informationAUDIT UNITED NATIONS VOLUNTEERS PROGRAMME INFORMATION AND COMMUNICATION TECHNOLOGY. Report No Issue Date: 8 January 2014
UNITED NATIONS DEVELOPMENT PROGRAMME AUDIT OF UNITED NATIONS VOLUNTEERS PROGRAMME INFORMATION AND COMMUNICATION TECHNOLOGY Report No. 1173 Issue Date: 8 January 2014 Table of Contents Executive Summary
More informationSDSFIE Quality (SDSFIE-Q)
Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) SDSFIE Quality (SDSFIE-Q) 12 December 2016 Prepared By: The Installation Geospatial Information and Services Governance Group
More informationTest & Evaluation of the NR-KPP
Defense Information Systems Agency Test & Evaluation of the NR-KPP Danielle Mackenzie Koester Chief, Engineering and Policy Branch March 15, 2011 2 "The information provided in this briefing is for general
More informationSDDC CAMPAIGN PLAN OVERVIEW MILITARY SURFACE DEPLOYMENT AND DISTRIBUTION COMMAND
RF Y SU ACE D AR E IT MI L CAMPAIGN PLAN OVERVIEW R.E.A.D.Y. 2017-2020 Responsive to the Warfighter, Expeditionary - Fight Tonight, Agile Business Process-Audit Compliant, Delivering Readiness, Your Joint
More informationDISA CLOUD CLOUD SYMPOSIUM
DISA CLOUD P L A Y B O O K CLOUD SYMPOSIUM DISA Cloud Adoption Cycle LEARN CHOOSE BUY CONFIGURE TRANSITION UTILIZE CLOUD CONSUMER What Mission Partners Should Know and Do Cloud Policies Goals (Fit, Leverage,
More informationSecuring the AF Intranet. NIKSUN World-Wide Security and Mobility Conference Col (ret.) Russ Fellers
Securing the AF Intranet NIKSUN World-Wide Security and Mobility Conference Col (ret.) Russ Fellers 25 July 2011 Agenda Network Security: AF Perspective AF Network Security Challenges Goal: One AF, One
More informationDEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND Joint Interoperability Test Command (JTE) 23 Oct 12
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 IN REPLY REFER TO: Joint Interoperability Test Command (JTE) 23 Oct 12 MEMORANDUM FOR DISTRIBUTION SUBJECT: Extension of
More informationISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard
Certification Exam Outline Effective Date: April 2013 About CISSP-ISSMP The Information Systems Security Management Professional (ISSMP) is a CISSP who specializes in establishing, presenting, and governing
More informationInstallation Geospatial Information and Services (IGI&S) - Update on Policy, Standards, Issues
Installation Geospatial Information and Services (IGI&S) - Update on Policy, Standards, Issues Mr. David LaBranche, PE Geospatial Information Officer OASD(EI&E) February 14, 2017 Agenda IGI&S Policy Implementation
More informationEnterprise Geographic Information Servers. Dr David Maguire Director of Products Kevin Daugherty ESRI
Enterprise Geographic Information Servers Dr David Maguire Director of Products Kevin Daugherty ESRI Outline Introduction Enterprise GIS vs. Spatially-enabled IS Architectures for building Enterprise GIS
More informationThis is to certify that. Chris FitzGerald. has completed the course. Systems Security Engineering _eng 2/10/08
This is to certify that Chris FitzGerald has completed the course Systems Security Engineering - 206760_eng on 2/10/08 Systems Security Engineering About This Course Overview/Description To define the
More informationInteragency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008
Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal
More informationAntiterrorism / Force Protection (AT/FP) Assessment Tool Training. Module 1: Policy Drivers for MARMS & AT/FP Assessments
Antiterrorism / Force Protection (AT/FP) Assessment Tool Training Module 1: Policy Drivers for MARMS & AT/FP Assessments Supporting Joint Staff J33 via US Army Armament, Research, Development and Engineering
More informationCIS 444: Computer. Networking. Courses X X X X X X X X X
4012 Points Courses * = Can include a summary justification for that section. FUNCTION 1 - GRANT FINAL ATO A. Responsibilities 1. Aspects of Security *Explain the importance of SSM role in (IA) 2. Accreditation
More informationA Metadata Standard for IGI&S: Spatial Data Standards for Facilities, Infrastructure, and Environment - Metadata (SDSFIE-M)
A Metadata Standard for IGI&S: Spatial Data Standards for Facilities, Infrastructure, and Environment - Metadata (SDSFIE-M) Mr. David LaBranche, PE DISDI Program Manager ODUSD(I&E) July 15, 2014 ESRI IUC
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.
More informationPanduit Unified Operations Center
Panduit Unified Operations Center About Panduit Corporation Founded in 1955, Panduit is a privately held, leading global manufacturer of high-quality products for wiring and communications applications.
More informationCOMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE COMMANDER NATIONAL AIR & SPACE INTELLIGENCE CENTER NASIC INSTRUCTION 33-108 6 JUNE 2013 Communications NASIC STRATEGIC IT MANAGEMENT COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY:
More information853 ELSG / ND. USAF Airfield Automation System CNS/ATM Conference 2008 Tampa, FL
853 ELSG / ND I n t e g r i t y - S e r v i c e - E x c e l l e n c e USAF Airfield Automation System CNS/ATM Conference 2008 Tampa, FL Christin Gurgo 853 ELSG/ND Jack Clark USDOT/RITA AFAS Overview Organizations
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS IA Policies, Procedures, The Information Assurance (IA) Policies, Procedures, encompasses existing policies, procedures,
More informationFEMA Region IX. RRCC Watch Center. August 2009
FEMA Region IX RRCC Watch Center August 2009 Mission The Regional Response Coordination Center (RRCC) Watch Center is a 24-Hour, 7-Day-Per-Week Function that maintains Regional Situational Awareness of
More informationDepartment of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Media Activity Overview
Mission Area Department of Defense Overview Business System Breakout Appropriation BMA 0.163 Total 24.846 Defense Business Systems 0.163 All Other Resources 24.683 EIEMA 24.683 FY 2014 ($M) FY 2014 ($M)
More informationWORKSHARE SECURITY OVERVIEW
WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625
More informationMAASTO TPIMS Systems Engineering Analysis. Documentation
MAASTO TPIMS Project MAASTO TPIMS Systems Engineering Analysis Documentation Date: November 18, 2016 Subject: MAASTO TPIMS Systems Engineering Analysis and Supplementary Project Documentation Summary Introduction
More informationHarsh Environment Solutions
Harsh Environment Solutions Harsh Environments Require Unique Solutions A Unified Approach to Operating in Harsh Environments. Oil rigs, mines, wind farms, and industrial manufacturing facilities are often
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Deployment Deployment is the phase of the system development lifecycle in which solutions are placed into use to
More informationTHE BENEFITS OF DOING THE SAME THING, THE SAME WAY, EVERYWHERE
Approved for Public Release THE BENEFITS OF DOING THE SAME THING, THE SAME WAY, EVERYWHERE Tim Swett, Lianne Poisson, Twila Pfieffer, Danny Poisson Raytheon Company GBS Information Technology liveworx.com
More informationNational Information Assurance (IA) Policy on Wireless Capabilities
Committee on National Security Systems CNSS Policy No. 17 National Information Assurance (IA) Policy on Wireless Capabilities This document prescribes minimum standards. Your department or agency may require
More informationInstructions for Completing a Key Leadership Position Joint Qualification Board Application
Instructions for Completing a Key Leadership Position Joint Qualification Board Application This guide provides instructions for completing the Key Leadership Position (KLP) Joint Qualification Board Application.
More information3-Part Guide to Developing a BYOD Strategy
An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)
More informationCompTIA CASP (Advanced Security Practitioner)
CompTIA CASP (Advanced Security Practitioner) Course Length: 5 days (virtual) Click here to view the current class schedule! Overview: The CompTIA Advanced Security Practitioner (CASP) Certification is
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationBoundary Security. Innovative Planning Solutions. Analysis Planning Design. criterra Technology
Boundary Security Analysis Planning Design Innovative Planning Solutions criterra Technology Setting the new standard DEFENSOFT - A Global Leader in Boundary Security Planning Threats, illegal immigration
More informationDISDI Plenary Session
JSEM JSEM // Geospatial Geospatial Information Information & & Services Services Conference, Conference, 2007 2007 DISDI Plenary Session 22 22 May May 2007 2007 Columbus, Columbus, Ohio Ohio JSEM JSEM
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationJob Aid: Introduction to the RMF for Special Access Programs (SAPs)
Contents Terminology... 2 General Terminology... 2 Documents and Deliverables... 2 Changes in Terminology... 3 Key Concepts... 3 Roles... 4 Cybersecurity for SAPs: Roles... 5 Support/Oversight Roles...
More informationState of Cloud Survey GERMANY FINDINGS
2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff
More informationHIPAA by the Numbers. Presented by: Mark L. Schuweiler Director of Global Information Assurance Services EDS Corporation
HIPAA by the Numbers Presented by: Mark L. Schuweiler Director of Global Information Assurance Services EDS Corporation Security vs Privacy Privacy right of a individual to control his/her personal information
More informationAir Force Civil Engineer Center. Director s View. Randy Brown Director 4 May Battle Ready Built Right! 1
Air Force Civil Engineer Center Director s View Randy Brown Director 4 May 2017 Battle Ready Built Right! 1 AFCEC Organization Local Partners AFCEC Director AFLOA/JACE Deputy (JBSA-Lackland) Deputy (Tyndall)
More informationMy Two Cats Are a Community of Interest. Dr. Scott Renner
My Two Cats Are a Community of Interest Dr. Scott Renner sar@mitre.org Outline History Current situation Proposed direction History of COIs DoD Data Admin program, 1991-2000 Data Interoperability Rapid
More informationMIS Week 9 Host Hardening
MIS 5214 Week 9 Host Hardening Agenda NIST Risk Management Framework A quick review Implementing controls Host hardening Security configuration checklist (w/disa STIG Viewer) NIST 800-53Ar4 How Controls
More informationPAGE - 16 PAGE - 1. Sometimes, the solution is just a benchmark away..
PAGE - 16 PAGE - 1 Sometimes, the solution is just a benchmark away.. Post Box 301532, Riyadh 11372, Kingdom Of Saudi Arabia. Tel: +966 1 229 1819 Fax: +966 1 229 1801 PAGE - 2 PAGE - 3 The base of automation
More informationCritical Infrastructure Security Vulnerability Assessment. A New Approach. Norman Bird - Senior Technical Lead - Nuclear Security
Critical Infrastructure Security Vulnerability Assessment A New Approach Norman Bird - Senior Technical Lead - Nuclear Security Critical Infrastructure Protection and Resilience Europe (CIPRE) Securing
More informationWhat can the OnBase Cloud do for you? lbmctech.com
What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding
More informationQUIACLE TECHNOLOGY SOLUTIONS, INC. CLOUD SERVICES MANAGED SECURITY SERVICES
QUIACLE TECHNOLOGY SOLUTIONS, INC. CLOUD SERVICES MANAGED SECURITY SERVICES WHO WE ARE Founded in 2014 Headquartered in Frederick County, MD Registered in the System for Award Management (SAM) Women's
More informationUsing GIS to Help Support and Sustain U.S. Army Ranges - A Global Approach
INFRASTRUCTURE & TECHNOLOGY Using GIS to Help Support and Sustain U.S. Army Ranges - A Global Approach Robert Maple, GIS Program Manager Army Sustainable Range Program (SRP) Geospatial Support Center Army
More informationTB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored
the onbase cloud ONBASE CLOUD // Experience Matters The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, an established history of
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationENGINEERING AND CONSTRUCTION BULLETIN
ENGINEERING AND CONSTRUCTION BULLETIN No. 2018-7 Issuing Office: CECW-EC Issued: 06 Jun 18 Expires: 06 Jun 20 SUBJECT: Advanced Modeling Requirements on USACE Projects CATEGORY: Directive and Policy 1.
More informationInstalling VMware vsphere 5.1 Components
Installing VMware vsphere 5.1 Components Module 14 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks
More informationNew Hampshire and BizTalk. What We Node
New Hampshire and BizTalk What We Node History: New Hampshire has participated in all phases of Node development to date. This includes the Alpha, Beta, Node 1.0 and now with the Node Mentoring Grant group
More informationSMC/RN Compatible Satellite C2 (Sat C2) GSAW Vinay Swaminathan SMC/RN
SMC/RN Compatible Satellite C2 (Sat C2) GSAW 2012 Vinay Swaminathan SMC/RN Background SMC/CC tasker to RN (Spring 2006) Identify Satellite Command & Control architecture based on accepted standards applicable
More informationSony Adopts Cisco Solution for Global IPv6 Project
Customer Case Study Sony Adopts Cisco Solution for Global IPv6 Project Sony aims to accelerate global collaboration and business across business units to realize goal of "One Sony." EXECUTIVE SUMMARY Customer
More informationInformation Systems Security Requirements for Federal GIS Initiatives
Requirements for Federal GIS Initiatives Alan R. Butler, CDP Senior Project Manager Penobscot Bay Media, LLC 32 Washington Street, Suite 230 Camden, ME 04841 1 Federal GIS "We are at risk," advises the
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationThe Oracle Enterprise Geodatabase (EGDB) Charlie Crocker Farallon Geographics, Inc.
The Oracle Enterprise Geodatabase (EGDB) Charlie Crocker Farallon Geographics, Inc. www.fargeo.com Norcal URISA Chapter Meeting 2/9/2005 Todays Goals Enterprise geodatabase defined Roles Oracle can play
More informationDEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY. Cyber Security. Safeguarding Covered Defense Information.
DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY Cyber Security Safeguarding Covered Defense Information 30-31 August 2016 WARFIGHTER FIRST PEOPLE & CULTURE STRATEGIC ENGAGEMENT FINANCIAL
More informationFiXs - Federated and Secure Identity Management in Operation
FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems
More informationEnterprise Online Help for GCCS-J and JC2CUI: An example of Enterprise Software Engineering. 2 April Ross Adjei Mike Nguyen
Enterprise Online Help for GCCS-J and JC2CUI: An example of Enterprise Software Engineering 2 April 2014 Ross Adjei Mike Nguyen Agenda Background Architecture Implementation/Demo Performance Challenges
More informationTask Force Cyber Secure
Headquarters U.S. Air Force Task Force Cyber Secure Colonel Bill Data Bryant Task Force Cyber Secure Deputy Director Task Force Objectives Synchronize multiple efforts and studies attempting to address
More informationHelping Meet the OMB Directive
Helping Meet the OMB 11-11 Directive March 2017 Implementing federated identity management OMB Memo 11-11 Meeting FICAM Objectives Figure 1: ICAM Conceptual Diagram FICAM Targets Figure 11: Federal Enterprise
More informationAccounts and permissions
Accounts and permissions IMCOM Enterprise Web SOP & Tutorial 5 Version 3.5 TUTORIAL 5 PAGE 1 Contents and general instructions PAGE: 3. Important policy and version notes 4. Roles in IMCOM Enterprise Web
More informationKroll Ontrack VMware Forum. Survey and Report
Kroll Ontrack VMware Forum Survey and Report Contents I. Defining Cloud and Adoption 4 II. Risks 6 III. Challenging Recoveries with Loss 7 IV. Questions to Ask Prior to Engaging in Cloud storage Solutions
More informationINTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA and PACIFIC OFFICE ASIA/PAC RECOMMENDED SECURITY CHECKLIST
INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA and PACIFIC OFFICE Aeronautical Telecommunication Network Implementation Coordination Group (ATNICG) ASIA/PAC RECOMMENDED SECURITY CHECKLIST September 2009
More informationLSGI 521: Principles of GIS. Lecture 5: Spatial Data Management in GIS. Dr. Bo Wu
Lecture 5: Spatial Data Management in GIS Dr. Bo Wu lsbowu@polyu.edu.hk Department of Land Surveying & Geo-Informatics The Hong Kong Polytechnic University Contents 1. Learning outcomes 2. From files to
More informationNet-centric Characteristics
Net-centric Characteristics Heterogeneous Variety is essential and inevitable basis for healthy evolutionary growth and survival within dynamic threat environment Parallel Multiple implementation and concurrent
More informationInformation Technology General Control Review
Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor
More informationA New Governance Plan for the Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE)
A New Governance Plan for the Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) Mr. David LaBranche, PE DISDI Group Chair ODUSD(I&E) June 24, 2014 1 Overview and Background
More informationAir Force Acquisition
Headquarters U.S. Air Force Air Force Acquisition Dr. Bill LaPlante Assistant Secretary of the Air Force (Acquisition) 1 USAF Acquisition Priorities Get the high priority programs right & keep them on
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More informationTABLE OF CONTENTS. Page REFERENCES 5 DEFINITIONS 8 ABBREVIATIONS AND/OR ACRONYMS 18 C1. CHAPTER 1 - INTRODUCTION 20
1 2 FOREWORD TABLE OF CONTENTS Page REFERENCES 5 DEFINITIONS 8 ABBREVIATIONS AND/OR ACRONYMS 18 C1. CHAPTER 1 - INTRODUCTION 20 C1.1. BACKGROUND 20 C1.2. TECHNOLOGY OVERVIEW 21 C1.3. DITSCAP OBJECTIVE
More informationWebEx Management. GP Connect. WebEx Interactions
WebEx Management GP Connect WebEx Interactions Submit questions using the chat facility to everyone Please keep chat conversations private Refrain from answering questions proposed We ll answer questions
More informationAll Partners Access Network (APAN) AFSAC Foreign Liaison Officer (FLO) Collaboration
All Partners Access Network (APAN) AFSAC Foreign Liaison Officer (FLO) Collaboration U.S. AIR FORCE Contents About... 3 Mission... 3 AFSAC FLO Community Site... 3 What content can be posted on the Flo
More informationEnabling Efficient, Consistent Certification and Accreditation Enterprise-Wide
Enabling Efficient, Consistent Certification and Accreditation Enterprise-Wide www.xacta.com Overview Certification & Accreditation The IRS Challenge The Solution: Xacta Web C&A Where Are We Today? Future
More informationIBM C Exam. Volume: 65 Questions
Volume: 65 Questions Question No: 1 A customer has a requirement which is currently unavailable in an out-of-the-box product. Who would be able to assist in troubleshooting the customer when developing
More informationOverview Traditional converged infrastructure systems often require you to choose different systems for different applications performance, capacity,
Solution overview A New Generation of Converged Infrastructure that Improves Flexibility, Efficiency, and Simplicity Enterprises everywhere are increasingly adopting Converged Infrastructure (CI) as one
More informationPresented by Max Fritz Senior Systems Consultant, Now Micro. Office 365 for Education What to Use When
Presented by Max Fritz Senior Systems Consultant, Now Micro Office 365 for Education What to Use When Max Fritz Senior Systems Consultant MCSA Office 365, MCSE Productivity Founder of Minnesota Office
More information