Information Solutions
|
|
- Imogen Franklin
- 5 years ago
- Views:
Transcription
1 Information Solutions Bob Tarvin Senior Manager - Supplier Management The Boeing Company
2 Personnel Information Networks Monitor Environment Projection: Organizations Events Plan Course of Action Comprehension: Places Perception: Knowing the objects within the environment Rehearse Course of Action Assured Command and Control System Plan Analyze Situation What is going on? Why is it happening? What is going to happen next? What can I do about it? Situational Awareness Understanding how those objects fit together and are used towards a common goal Cyber Compass Rehearse Execute Course of Action Execute Track Mission and COA Track Analyze Mission and COA Effectivity Predict or anticipate likely outcomes of the situation Assess Monitor your environment Maintain your perception Maintain your understanding Anticipate the future Analyze your situation Plan a course of action Rehearse the course of action Execute the course of action Track the COA and Mission Assess the effectivity Maintain command and control in the face of adversity Additional Servers Blue Server 2 Blue Server 1 White Server Red/Gray Server Hardware in the Loop How did we get here? Organic R&D VLAN 0 (Default) VLAN 1 Network-based Cyber Solutions Acquisitions Traffic Intelligence Cyber Reference Architecture Targeted Goal Cyber Compass Cyber Range in a Box Access Cross-domain Corporate IT Predictive Analysis Existing Boeing Programs Proprietary Wireless Networks Energy NSA DoD
3 Information Solutions Site Locations 2,900 Employees Across 27 Sites Business Areas Bangor Advanced Information Solutions Advanced Technology Programs Intelligence Systems Group Sunnyvale Denver & Colorado Springs St. Louis Berkeley Heights, NJ Potomac Region Hampton Mission Operations Security & Information Services Anaheim, SB, HB Chandler, Mesa, Tucson India Richardson Houston Huntsville Ft. Walton Beach Cape Canaveral
4 Information Solutions Products Security and Information Services Cyber Engagement Center Narus Virtual Security Operations Console International Security TSA Intelligence Systems Group Maritime Information Services Geospatial Intelligence and Visualization Information Sharing Advanced IS Advanced Technology Programs DataMaster 4
5 Six Macro Trends Impacting our Customers Data proliferation Rapid growth in the volume and types of data Pressure to generate intelligence from data Need to combine information to build comprehensive situational awareness Persistent & asymmetric security threats Traditional threats compounded by dimensions of new non nation-state and non-kinetic threats (e.g., cyber security, IEDs) Requires convergence of information and physical security Rapid adoption of mobility Consumerization of IT Need to adopt mobile hardware and apps to accelerate operational cycle time Risk to data integrity and security with increased mobility Migration to mobile provides competitive advantage Consumer markets drive IT innovation and adoption ahead of enterprise Cycle time of IT adoption and commoditization accelerating Need for solution offerings that integrate with existing systems Government effectiveness & efficiency Lower government budgets and mandate for efficiency Government exploring new business models for procuring technology Smaller contract awards with quicker proposal windows Shift in business model Move towards managed services in the public sector following change already happening in commercial sector Hosted and managed services provide better economics and accountability
6 IS Business Model Secure Applications Secure Applications Enable data analysis and situational awareness for decision making in a secure environment Secure Infrastructure Deliver solutions that focus on securing high-value physical and virtual infrastructures Secure Infrastructure Secure Mobility Secure Mobility Provide solutions that enable secure mobility in government or corporate environments Securing applications, infrastructure and mobile ecosystems
7 Secure Applications Capability Areas Content Management and Analytics Secure Information Sharing Ground System Development and Operations Operational Support and Sustainment Test and Build Support Offerings Boeing Cross Domain Sharing (BXDS) Kestrel TAC exmeritus HardwareWall Global Geospatial Intelligence Commercial Satellite Operations Agile Software Development Enable data analysis and situational awareness for decision making in a secure environment
8 Secure Infrastructure Capability Areas Enterprise Infrastructure Services Architecture Design Vulnerability and Threat Detection Physical Security Integration Forensic and Investigative Services Offerings Border Security Cyber Range in a Box (CRIAB) Compass Network and Security Ops Centers Network Security Assessments Sensor Integration and Processing Virtual Security Operations Console (VSOC) Deliver solutions that focus on securing high-value physical and virtual infrastructures
9 Secure Mobility Capability Areas Systems Engineering and Requirements Analysis Enterprise Mobile Implementations Mobile Application Services End-to-End Network Security Mobile Information Assurance Offerings Custom Application Development GoMobile Services Hosted Application Store MobileNet Core Ravenwing Phone Provide solutions that enable secure mobility in government or corporate environments
10 Cyber Engagement Center (CEC) September 2011
11 Cyber Engagement Center Location: Annapolis Junction, MD One-Boeing Resource integrating Cyberspace security and IT operations Flexible Enough For Multiple Customers And Multiple Security Levels Provides Key Venue For Prototyping, Customer Interaction, Development And Experimentation Shows Products In Action Via ITOC Integration Security Operations Integration rooms and conference room Experimentation room/it Information Security conference room/ DIB Conference Room Unclassified: RF Lab/Workrooms/ conference rooms Secure Spaces/Secure Space ITOC Area Experience Center Immersive Visualization ITOC Operations Oriented Environment Cyber Cube: Interactive Storyboarding
12 Small Business Needs 3D Modelers.net and sharepoint developers TS/SCI clearances with Full Scope Poly Software Engineers System Engineers Developers/Programmers Small disadvantaged businesses (WO, VO, SDVO, HUBzone, SDB) located in Arizona, California, and New Mexico that can perform physical installation of networking and communications gear Metal fabrication experience that can build Boeing-designed tower platforms (platforms that go on the top of towers and house our sensor packages). kit racks Boeing ships the components and the supplier assembles everything and packs the completed rack for Boeing
13 Contacts Robert Tarvin Sr. Manager Integrated Intelligence Bob Tarvin Senior Manager Supplier Management Intelligence Systems Group O: David Canada Supplier Program Manager David Canada Supplier Program Manager Information Solutions O: John Smith Procurement Agent John Smith Jr. Procurement Agent Annapolis Junction Intelligence Systems Group O: Tina Wooden Small Business Diversity Rep Tina N. Wooden Information Solutions Small/Diverse Business and Strategic Alliances P:
Intelligence & Security Overview
Intelligence & Security Overview 2014 1 Our Mission Employees: ~10,000 84% cleared Headquarters: McLean, VA Mission: BAE Systems Intelligence & Security enables the U.S. government to transform data into
More informationCyber Challenges and Acquisition One Corporate View
Sentar Inc 315 Wynn Dr Huntsville, AL 35805 256-430-0860 www.sentar.com Cyber Challenges and Acquisition One Corporate View Defense Acquisition University Conference Huntsville, AL February 22-23, 2011
More informationWhy Enterprises Need to Optimize Their Data Centers
White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program Element 8.306 7.299 10.429-10.429 11.464 12.492 12.840 13.010 Continuing Continuing
More informationRobert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group
Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Presentation Objectives Introductions Cyber security context Cyber security in the maritime sector Developing cybersecurity
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)
More information2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat
2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat Faye Francy Aviation ISAC February 2015 Company Organization Corporate Defense, Space & Security Boeing Capital Corporation
More informationCybersecurity Risk Management:
Cybersecurity Risk Management: Building a Culture of Responsibility G7 ICT and Industry Multistakeholder Conference September 25 2017 Adam Sedgewick asedgewick@doc.gov Cybersecurity in the Department of
More informationDEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY. Cyber Security. Safeguarding Covered Defense Information.
DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY Cyber Security Safeguarding Covered Defense Information 30-31 August 2016 WARFIGHTER FIRST PEOPLE & CULTURE STRATEGIC ENGAGEMENT FINANCIAL
More informationUNCLASSIFIED FY 2016 OCO. FY 2016 Base
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationForecast to Industry 2016
Forecast to Industry 2016 Cyber Portfolio COL Brian Lyttle Program Executive Officer, Cyber 17 November 2016 UNCLASSIFIED 1 Our Mission Develop, integrate, and assure cyber capabilities in order to enable
More informationGlobal Security Operation Center GSOC
Global Security Operation Center GSOC Best of Breed Opinion Basic requirements for a best in class Global Security Operation Center. CONSULTING AND INVESTIGATIONS DIVISION The Consulting and Investigations
More informationCERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University
CERT Overview Jeffrey J. Carpenter 2008 Carnegie Mellon University Software Engineering Institute Department of Defense R&D Laboratory FFRDC Created in 1984 Administered by Carnegie Mellon
More informationTeam Capabilities and Specializations
Team Capabilities and Specializations X-Feds, The Small Business headquartered in San Diego, CA with satellite offices located in Virginia, Indiana, Charleston and the National Capital Region. Established
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationYour Challenge. Our Priority.
Your Challenge. Our Priority. Building trust and Confidence. When Federal managers and military leaders face tough challenges in cyber, data collection & analytics, enterprise IT or systems and software
More informationSecuring Digital Transformation
September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationOUR VISION To be a global leader of computing research in identified areas that will bring positive impact to the lives of citizens and society.
Join the Innovation Qatar Computing Research Institute (QCRI) is a national research institute established in 2010 by Qatar Foundation for Education, Science and Community Development. As a primary constituent
More informationThe Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions
The Mobile Risk Management Company Overview of Fixmo and Mobile Risk Management (MRM) Solutions Company Proprietary Information Copyright Fixmo Inc., 2012 Introduction to Fixmo Founded on a simple idea:
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More informationWhite Paper. View cyber and mission-critical data in one dashboard
View cyber and mission-critical data in one dashboard Table of contents Rising cyber events 2 Mitigating threats 2 Heighten awareness 3 Evolving the solution 5 One of the direct benefits of the Homeland
More informationSmart Manufacturing and Standards: The NIST Role
Smart Manufacturing and Standards: The NIST Role Al Wavering, Chief Intelligent Systems Division Engineering Laboratory National Institute of Standards and Technology U.S. Department of Commerce October
More informationOracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker
Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker October 14, 2016 Copyright 2016, Oracle and/or its affiliates. All rights reserved. Oracle is currently
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete
More informationCisco ONE Software BRKRST Dan Lohmeyer Senior Director, Software Strategy and Operations
Cisco ONE Software BRKRST-1213 Dan Lohmeyer Senior Director, Software Strategy and Operations Agenda Introduction Enterprise Challenges Cisco ONE Software Conclusion Enterprise Challenges IT Decision Maker
More informationTRIAEM LLC Corporate Capabilities Briefing
TRIAEM LLC Corporate Capabilities Briefing 3/4/ 1 CORPORATE OVERVIEW CORPORATE VALUES MISSION STATEMENT SERVICES WORKFORCE EXPERIENCE CORPORATE CONTACTS 3/4/ 2 CORPORATE OVERVIEW TRIAEM is certified through
More informationCisco Connected Factory Accelerator Bundles
Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment
More informationSpace and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)
Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) SSC Atlantic is part of the Naval Research & Development Establishment (NR&DE) Information Warfare Research Project
More informationIntegrated C4isr and Cyber Solutions
Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a
More informationDepartment of Management Services REQUEST FOR INFORMATION
RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationCertified Information Security Manager (CISM) Course Overview
Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More information2018 Project Focus of IPSR. Dr. Robert C. Pfahl Director of Roadmapping March 12, 2018 OFC
2018 Project Focus of IPSR Dr. Robert C. Pfahl Director of Roadmapping March 12, 2018 OFC Sponsors & Participants Sponsor Lead Participants 1 Goals and Objectives of IPSR Goals Create A Self-Sustaining
More informationThe New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC
The New Enterprise Network In The Era Of The Cloud Rohit Mehra Director, Enterprise Communications Infrastructure IDC Agenda 1. Dynamics of the Cloud Era 2. Market Landscape 3. Implications for the new
More informationLTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security
LTI Security Intelligent & integrated Approach to Cyber & Digital Security Overview As businesses are expanding globally into new territories, propelled and steered by digital disruption and technological
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationUpdate on the Government of Canada s Information Technology Transformation Plan
Update on the Government of Canada s Information Technology Transformation Plan Presentation to the Information Technology Infrastructure Roundtable June 27, 2016 Peter Bruce, Senior Assistant Deputy Minister,
More informationThe Oracle Trust Fabric Securing the Cloud Journey
The Oracle Trust Fabric Securing the Cloud Journey Eric Olden Senior Vice President and General Manager Cloud Security and Identity 05.07.2018 Safe Harbor Statement The following is intended to outline
More informationDepartment of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Advanced Research Projects Agency Overview
Mission Area Business System Breakout Appropriation BMA 0.027 Total 35.003 Defense Business Systems 0.027 All Other Resources 34.976 EIEMA 34.976 FY 2014 ($M) FY 2014 ($M) 35.003 FY 2014 ($M) FY13 to FY14
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate
More informationGreg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security
1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE
More informationCyber Security Maturity Model
Cyber Security Maturity Model Robert Lentz Former DoD CISO / Deputy Assistant Secretary Cyber Facts Facts About About Intrusions Intrusions 2 Verizon 2010 Data Breach Investigation Report WHO IS BEHIND
More informationNational Cybersecurity Center of Excellence
The 3rd Annual Intelligence and National Security Forum Jim McCarthy NIST / NCCoE 05/11/2018 This presentation is unclassified in its entirety Foundations Collaborative Hub The NCCoE assembles experts
More informationTHE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER
THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationO&M Service for Sustainable Social Infrastructure
O&M Service for Sustainable Social Infrastructure Hitachi Review Vol. 62 (2013), No. 7 370 Toshiyuki Moritsu, Ph. D. Takahiro Fujishiro, Ph. D. Katsuya Koda Tatsuya Kutsuna OVERVIEW: Hitachi is developing
More informationNERC Staff Organization Chart Budget 2018
NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationTHE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER
FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationDELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1
DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 MISSION-DRIVEN SOLUTIONS 2018 INTEGRATED INTEL SOLUTIONS ALL RIGHTS RESERVED MISSION-DRIVEN SOLUTIONS
More informationConsortium Industry Day
Cyberspace Real-time Acquisition Prototyping Innovation Development (C-RAPID) Consortium Industry Day LTC Scott Helmore UNCLASSIFIED Introduction Welcome to PEO EIS C-RAPID Industry Day PEO BG Burden DPEO
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationNERC Staff Organization Chart
NERC Staff Organization Chart President and CEO Administrative Associate Director to the Office of the CEO Associate Director, Member Relations and MRC Secretary Senior Vice President and Chief Reliability
More informationCharts from the January 2016 Federal Cloud Computing Summit. Justin F. Brunelle (MITRE Chair)
Charts from the January 2016 Federal Cloud Computing Summit Justin F. Brunelle (MITRE Chair) Cloud O&M: Challenges and Solutions Sara Mosley, Jeff Wootton, Mano Malayanur Planning for Cloud migration:
More informationRocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency
Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities
More informationAchieving a Secure and Resilient Cyber Ecosystem: A Way Ahead
Achieving a Secure and Resilient Cyber Ecosystem: A Way Ahead January 2016 Continuing to strengthen the security and resilience of our nation s critical infrastructure in partnership with you Our Responsibilities
More informationJane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity.
Jane s Defence Industry & Markets Intelligence Centre Develop Advantage. Mitigate Risk. Capture Opportunity. OVERVIEW A challenging marketplace The global A&D industry is facing an increasingly volatile,
More informationThe Key Principles of Cyber Security for Connected and Automated Vehicles. Government
The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational
More informationNIST Cloud Computing Security Working Group
NIST Cloud Computing Security Working Group NIST Cloud Computing Security Reference Architecture NIST Enterprise-Wide Data-Centric Computing Environment February, 2013 Dr. Michaela Iorga, NIST, Computer
More informationCyberspace: New Frontiers in Technology Insertion
Cyberspace: New Frontiers in Technology Insertion Dr. John S. Bay, ST Chief Scientist, Air Force Research Laboratory, Information Directorate AFRL Structure AFRL Maj Gen C Bedke Staff XP Air Vehicles Space
More informationImproving SCADA System Security
Improving SCADA System Security NPCC 2004 General Meeting Robert W. Hoffman Manager, Cyber Security Research Department Infrastructure Assurance and Defense Systems National Security Division, INEEL September
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationIT-CNP, Inc. Capability Statement
Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government
More informationCyber Security CRA Overview
Cyber Security CRA Overview Patrick McDaniel (PM, PSU) & Edward Colbert (CAM, ARL) cra.psu.edu Approved for public release; distribution is unlimited. Cyber Security Collaborative Research Alliance A Collaborative
More informationRSA INCIDENT RESPONSE SERVICES
RSA INCIDENT RESPONSE SERVICES Enabling early detection and rapid response EXECUTIVE SUMMARY Technical forensic analysis services RSA Incident Response services are for organizations that need rapid access
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($
More informationTD01 - Enabling Digital Transformation Through The Connected Enterprise
TD01 - Enabling Digital Transformation Through The Connected Enterprise Name Mukund Title Business Manager, Software, Asia Pacific Date January 22, 2018 Copyright 2016 Rockwell Automation, Inc. All Rights
More informationThe Red Hat Way. Lee Miles General Manager, Red Hat Middle East, Turkey & Africa
The Red Hat Way Lee Miles General Manager, Red Hat Middle East, Turkey & Africa Connecting People is the best way to create Technology Community Builder Open source communities can innovate far more effectively
More informationDepartment of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Media Activity Overview
Mission Area Department of Defense Overview Business System Breakout Appropriation BMA 0.163 Total 24.846 Defense Business Systems 0.163 All Other Resources 24.683 EIEMA 24.683 FY 2014 ($M) FY 2014 ($M)
More informationIMPROVING CYBERSECURITY AND RESILIENCE THROUGH ACQUISITION
IMPROVING CYBERSECURITY AND RESILIENCE THROUGH ACQUISITION Briefing for OFPP Working Group 19 Feb 2015 Emile Monette GSA Office of Governmentwide Policy emile.monette@gsa.gov Cybersecurity Threats are
More informationCapgemini Dynamic Services
Capgemini Dynamic Services Evolution and dynamics of Copyright Capgemini 2015. All Rights Reserved 2 GEN 1 Simple IT GEN 2 Full Outsourcing GEN 3 Tower Sourcing GEN NEXT Micro Sourcing Business IT Interface
More informationQuality Collaboration Across Government and Industry in a Time of Profound Changes
Quality Collaboration Across Government and Industry in a Time of Profound Changes 2018 CQSDI March 12 2018 Todd Nygren Corporate Chief Engineer 2018 The Aerospace Corporation Compelling Time of Change
More informationSystems Engineering Division
Systems Engineering Division Bi-Monthly Meeting 16 August 2017 http://www.ndia.org/divisions/systems-engineering 1 Agenda (1 of 2) Time Topic Presenter(s) 0745 Coffee & Check-in 0830 1. Opening Remarks,
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationCOUNTRY PROFILE. Malaysia
COUNTRY PROFILE Malaysia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationMaking hybrid IT simple with Capgemini and Microsoft Azure Stack
Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.
More informationCSD Project Overview DHS SCIENCE AND TECHNOLOGY. Dr. Ann Cox. March 13, 2018
DHS SCIENCE AND TECHNOLOGY CSD Project Overview March 13, 2018 Dr. Ann Cox Program Manager Cyber Security Division Science and Technology Directorate CSD Mission & Strategy REQUIREMENTS CSD MISSION Develop
More information21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING
WWW.HCLTECH.COM 21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING THE AGE OF DISRUPTION: THE AGE OF CYBER THREATS While the digital era has brought with it significant advances in technology, capabilities
More informationDEFENSE LOGISTICS AGENCY
DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY Cyber Resilience Integration Mr. Linus Baker DLA Information Operations Director, Cybersecurity 1 Mission Assurance/Cybersecurity Concern
More informationCOUNTRY PROFILE. Mexico
COUNTRY PROFILE Mexico Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationIndia s National Policy On. Information Technology. Ajay Sawhney, President & CEO, National egovernance Division, Dept of IT
India s National Policy On Information Technology Ajay Sawhney, President & CEO, National egovernance Division, Dept of IT Current Status of IT/ITES Industry in India Indian IT-BPO industry (excluding
More informationErik Puskar Standards Coordination Office 30 May, 2013 World Trade Center Moscow
NIST and the Government Role in the U.S. Standards System Erik Puskar Standards Coordination Office 30 May, 2013 World Trade Center Moscow 1 Discussion Outline NIST Overview Government Role National Technology
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense : February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development
More informationReal-time Cyber Situational Awareness for Satellite Ground Networks. March 2015 Presenter: Ted Vera
Real-time Cyber Situational Awareness for Satellite Ground Networks March 2015 Presenter: Ted Vera Colorado Springs, CO (719) 598 2801 Denver, CO (303) 703 3834 http://www.rtlogic.com Recent Attacks NOAA
More informationCopyright 2012 EMC Corporation. All rights reserved.
1 2 Jeremy Burton Executive Vice President Product Operations & Marketing 3 Waves Of Change Mainframe Minicomputer PC/ Microprocessor Networked/ Distributed Computing Cloud Computing 4 EMC s Mission To
More informationEnterprise Ground Services (EGS) Overview. SMC/AD Col Jim Planeaux GSAW Presentation 2 Mar 2016 Distribution A: Approved for Public Release
Space and Missile Systems Center Enterprise Ground Services (EGS) Overview SMC/AD Col Jim Planeaux GSAW Presentation 2 Mar 2016 Distribution A: Approved for Public Release 1 Key Drivers for EGS AFSPC Commander
More informationNetwrix Virtual. Customer Summit 2016
Netwrix Virtual Customer Summit 2016 Welcome Michael Fimin Chief Executive Officer Phone: 1.949.407.5125 x1057 Email: Michael.Fimin@netwrix.com linkedin.com/in/michaelfimin Agenda Michael Fimin Chief Executive
More informationMIT Lincoln Laboratory Facilities Modernization. Dr. Israel Soibelman 23 February 2017
MIT Lincoln Laboratory Facilities Modernization Dr. Israel Soibelman 23 February 2017 Facilities Modernization Project - 1 MIT Lincoln Laboratory DoD Federally Funded Research and Development Center Massachusetts
More informationQuadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters
Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters QHSR Background Implementing Recommendations of the 9/11 Commission Act of 2007 directed DHS to Conduct a Quadrennial Homeland
More informationWelcome to the Second Annual Intelligence & National Security Forum
Welcome to the Second Annual Intelligence & National Security Forum Today s Agenda 0800 0900 Registration and Light Breakfast 0900 0910 Opening Remarks Mr. Paul J. Geraci, Senior Director Intelligence
More informationManufacturing USA. Dean L. Bartles. Ph. D., FASME, FSME Founding Executive Director DMDII Senior Technology Advisor - ASME
Manufacturing USA Dean L. Bartles. Ph. D., FASME, FSME Founding Executive Director DMDII Senior Technology Advisor - ASME 1 Standards Certification Conformity Assessment Courses Conferences Publications
More informationPublic, Private, or Hybrid Cloud
White Paper Public, Private, or Hybrid Cloud www.rapidscale.net 1 Public, Private, or Hybrid Cloud When it comes to business, cloud computing is on everyone s mind. This next generation of computing technology
More informationFuture Proofing your IT Infrastructure
Future Proofing your IT Infrastructure The Maritime CIO Forum Drs. Ing. René Pluis MBA MBI Senior Manager Global Energy Vertical Cisco Industry Marketing 3 June 2015, Thon Hotel Arena, Lillestrom, Norway
More informationToward All-Hazards Security and Resilience for the Power Grid
Toward All-Hazards Security and Resilience for the Power Grid Juan Torres Associate Laboratory Director, Energy Systems Integration National Renewable Energy Laboratory December 6, 2017 1 Grid Modernization
More informationINGRAM MICRO & DELL. Partner Kit
Partner Kit Partner Kit Welcome... Ingram Micro Dell Advantage Enterprise Range........................... Partner Support... Ingram Micro Key Contacts... Resources... 3 4 6 7 8 Partner Kit 2 Welcome to
More informationPreparing your network for the next wave of innovation
Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt
More information2017 Trends in Datacenter and Critical Infrastructure
PREVIEW 2017 Trends in Datacenter and Critical Infrastructure DEC 2016 Rhonda Ascierto, Research Director, Datacenter Technologies & Eco-Efficient IT Andy Lawrence, Research Vice President - Datacenter
More information