Joint Information Environment
|
|
- Damon Robertson
- 5 years ago
- Views:
Transcription
1 Joint Information Environment 28 May 14 1
2 Agenda JIE Necessity DISA s JIE Focus Takeaways Introduction of Breakout Session Leads
3 DoD IT Future: Joint Information Environment A secure joint information environment, comprised of shared information technology (IT) infrastructure, enterprise services, and a single security architecture to achieve full spectrum superiority, improve mission effectiveness, increase security and realize IT efficiencies. JIE is operated and managed per Unified Command Plan (UCP) using enforceable standards, specifications, and common tactics, techniques, and procedures (TTPs). Source: 6 Jul 12 DMAG/13 Jul 12 Tank JIE is NOT: Program of Record / Joint Program Office Turn key solutions Independent way of doing things
4 3 Dec Setting the Stage for C2 and Decision Support Data Access 4 Joint Information Environment
5 Unclassified/Pre-decisional/FOUO JAN 2013 [With the JIE], we will have set the conditions for next generation capabilities, fully leveraging the power and versatility of commercial information technology and evolving from a brittle, network-centric understanding of our information environment to a flexible datacentric environment enabling access to information at the point of need. GEN Martin E. Dempsey, Chairman of the Joint Chiefs of Staff Our IT systems do not simply allow us to one another, chat online, and access the web for our administrative tasks. They are the backbone we use to interconnect Operations across multiple domains and deliver mission success around the globe. 5
6 Decentralized Architecture Today Decentralized Systems Increase Our Cyber Attack Surface Attack Surface Servers Data centers Service specific IT End user devices Servers Data centers Service specific IT End user devices Servers Data centers Service specific IT End user devices Servers Data centers Service specific IT End user devices Servers Data centers Mission unique IT End user devices Internet Access Points 3 Feb not defensible over the long run. General Alexander Commander, USCYBERCOM 6
7 The Operational Environment - Today Regional Operations with Global Effects Operation Gladiator Shield Global Cyber Levant Planning USEUCOM / USCENTCOM Operation Enduring Freedom ISAF-Afghanistan Office of Security Cooperation Iraq Operation Jukebox Lotus Juniper Micron USAFRICOM / USEUCOM Humanitarian Assistance USPACOM Requires a synchronized unified effort across a global infrastructure
8 Where We Are Going 3 Dec
9 Unclassified/Pre-decisional/FOUO The JIE Target State 9 We need pioneers and visionaries and folks that are moving out to get us to where we need to go. We are not necessarily at a tipping point, but it is an informational point. the expectations on this agency are huge, they are tremendous and people are expecting us to build this out -Lt Gen Ronnie D. Hawkins, Jr., Director, DISA Our target objective state is a Joint Information Environment that optimizes the use of the DoD IT assets by converging communications, computing, and enterprise services into a single joint platform that can be leveraged for all Department missions. These efforts reduce total cost of ownership, reduce the attack surface of our networks, and enable DISA s mission partners to more efficiently access the information resources of the enterprise to perform their missions from any authorized IT device from anywhere in the world.
10 The Agency maintains four strategic goals. These goals and the supporting key objectives link our strategy to our day-to-day operations and guide us to build the DISA of tomorrow and achieve our Target Objective State. GOAL 1: Evolve the Joint Information Environment GOAL 2: Provide Joint Command and Control (JC2) and Leadership Support GOAL 3: Operate and Assure the Enterprise GOAL 4: Optimize Department Investments DISA Strategic Plan DISA Focus Area No. 1: DoD Joint Information Environment
11 Centralized Architecture Under the JIE Global Enterprise Operations Center w/ Enterprise Situational Awareness (SA) and C2 JIE Access Points (EOCs w/ Regional SA) DISN IP Transport Internet Access Points Enterprise Data Centers Enterprise Services Enterprise Cloud computing Identity Management Access Management Enterprise Portal Enterprise Licensing Enterprise Security System focused Application/data focused Implemented at key points Standardized configuration Simultaneously deployed controls Smaller more efficient force Visibility of entire JIE Real-time defensive operations 3 Feb
12 Joint Information Environment Globally Integrated Operations (Current Status May 2014) Global Continuum Through Regional Implementation EUROPEAN PACIFIC CONUS FOCUS: Concept Development Leverage JEN 1 st EOC Established TTPs 1 st JIE CDC, IAP, IPN SSA w/ JRSS FOCUS: Mission Partner Environment (MPE) interface with JIE Improved Cyber Resilience Data Center Consolidation from Unique PACOM operational area GEOC FOCUS: Build Joint Regional Security Stacks Establish MPLS Routing Core Delivers 11 JRSS Suites & MPLS Core Joint C2 (AF, AR, DISA) Regional Approach to Maturing the JIE and Integrating Technology Concurrently on a Global Basis 12
13 Single Security Architecture Collapses the network security boundaries Reduces the external attack surface Provides a defensible architecture Rapid and safe data sharing Enabling Activities (EUR) SA & C2 for initial B/P/C/S (Achieved Jul 13) Install SSA at the Core Data Center in Europe (Achieved Sep 13) Install SSA at the IAP (Achieved Nov 13) Install SSA at an IPN; JIE boundary protection implemented (Planned) Improve Warfighter C2 Improve Cyber C2 Efficiently Use Resources Securing data and its use, enabling Force-wide Collaboration Standardize security suites to inspect, block and collect Shrink the Domains Save 5-30 FTEs per Domain! 3 Dec
14 JIE Single Security Architecture, Big Data & Identity Access Management are the Foundation Identify aggregate Identify patterns and Access to all the raw Mine and Fuse data anomalous behaviors indicators that are data into observations that fit a malicious out of the norm profile Mar
15 JIE Operational Concept End-State 3-5 Years - Service-centric non-standard operations centers - Non-standard TTPs, architectures & applications - No standard ops architecture Now - GEOC established - Standardized TTPs - JIE ops architecture & Initial COP capability - Mixture of JIE EOCs and Service centers - Reduced number of CNDSPs - Fully meshed EOCs provide seamless control and failover - EOCs in place for all non-service unique missions - JIE COP in place - Automated capabilities in place, e.g. compliance verification and reporting - Standard TTPs, Architectures & Applications15 End State Regionally Focused but Globally Available to Deliver Cyber Effects 14
16 DoD Data Center Consolidation Mission Partner Data Centers Effective and Optimized Use of Data Centers Converged IT Increased Security Reduced Attack Surface Single Security Architecture Reduced Cost Consolidated IT Investment Consistent IT Architecture Enterprise Level Efficiencies Simplified, Standardized, and Centralized Infrastructure Core Data Centers 3 April
17 Base w/15,000 people and 10 phone systems Firewalls require units to deploy their own infrastructure FTEs required for O&M in each enclave Fort A Camp F Base B Converged IP Transport Station G Camp C Base H Enclave A Enclave I Base D Post I Existing Architecture Enclave J Unified Capabilities Enclave B Enclave H DISN Backbone JIE Future Architecture Fort E Station J Enclave C Enclave G Enclave D Enclave F Enclave E Integration of voice, video & data delivered ubiquitously Enterprise Session Controllers serving 200,000 users in a geographic region Streamlined Troubleshooting Integration with other Enterprise Services Soft Phones 1% Hard Phones 99% Deterministic Routing / Single Point of Failure Dynamic Routing / Self Healing Soft Phones 80% Hard Phones 20% Converged Voice, Video, and Collaboration Services Across the DoD in Real Time 17
18 COCOMs SERVICES SERVICES SERVICES AGENCIES COALITIONS IC Consumers DoD Enterprise Cloud Service Catalog DoD Enterprise Cloud Service Broker DoD Cloud Broker Roles Consistent DoD Security: - Cloud security models approved by DSAWG - Well defined security levels correlated to protection requirements - Alignment with IC for classified levels - Models enable repeatable security assessments Customer Engagement: - Consolidated DoD-wide cloud requirements - Identified opportunities for partnerships, efficiencies, strategic sourcing, service availability gaps, etc. - Assessments provided customers with appropriate solution alternatives Providers IOC -Initial Service Catalog -Security Models -Limited Business Model -Matching criteria -Initial CRM 28 Apr Engagement with Service providers: - Established terms and conditions for future contract vehicles - Conducted security assessments for FEDRAMP approved providers - Working within DISA and in partnership with Services to establish contract vehicles that address requirement gaps FOC -Increased Service Offerings -Security monitoring/sa -Mature processes -Ordering/provisioning tools -Automated customer interface -- Consistent Security posture -- Partnerships to increase cloud service offerings -- Efficiencies through economies of scale 18
19 Defense Enterprise Mobility Mobile devices will provide access to the DoD Information Networks (DoDIN), allowing warfighters to operate within the JIE when and where needed. DISA is charged with deploying an unclassified enterprise Application Store that will deliver, update and delete apps on mobile devices without having to return the device for service. Department of Defense App Store Deployed - Good Deployed Mobile Iron In Review/Testing Requested The JIE will Eliminate the Barriers allowing Mobile Access to C2 and Decision Support Data 4 Mar
20 Takeaways JIE is an Operational Imperative DISA s Strategic Focus is on JIE Implementation Partnership with Industry is Key to Success
21 A COMBAT SUPPORT AGENCY 93 Dec Sep
DISA Cybersecurity Service Provider (CSSP)
UNCLASSIFIED DISA Cybersecurity Service Provider (CSSP) Mission Partner Brief UNCLASSIFIED UNITED IN SERVICE TO OUR NATION Mr. Darrell Fountain Chief, DISA CSSP Services Branch November 2018 UNCLASSIFIED
More informationDISN Evolution. TDM Elimination. Mr. Jessie L. Showers, JR., SES Infrastructure Executive (IE) 15 June 2017 UNITED IN SERVICE TO OUR NATION
DISN Evolution TDM Elimination Mr. Jessie L. Showers, JR., SES Infrastructure Executive (IE) 15 June 2017 The IT Combat Support Agency RESOURCING ACQ/PROC DEV/TEST IMPLEMENTATION OPERATIONAL ENVIRONMENT
More informationAFCEA BELVOIR. Industry Day. Joint Service Provider Overview. Victor O. Shirley Chief of Staff Joint Service Provider April 4, 2018
AFCEA BELVOIR Industry Day Joint Service Provider Overview Victor O. Shirley Chief of Staff Joint Service Provider April 4, 2018 UNCLASSIFIED Agenda JSP Background/History Service to DoD Headquarters Mission
More informationDoD CIO s Areas of Focus. David A. Cotton Deputy CIO for Information Enterprise May 20, 2015
DoD CIO s Areas of Focus David A. Cotton Deputy CIO for Information Enterprise May 20, 2015 DoD CIO s Areas of Focus Joint Regional Security Stacks Cloud Computing & Data Center Consolidation Mission Partner
More informationMulti-National Information Sharing Briefing
Multi-National Information Sharing Briefing AFCEA TechNet Mr. Donald Parker DISA Multinational Information Sharing (MNIS) Division 2 Nov 2017 Current DISA-Managed Coalition Information Sharing Systems
More informationForecast to Industry 2018
Forecast to Industry 2018 The information provided in today s briefings is for general information purposes only. It does not constitute a commitment on behalf of the United States Government to provide
More informationDepartment of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Media Activity Overview
Mission Area Department of Defense Overview Business System Breakout Appropriation BMA 0.163 Total 24.846 Defense Business Systems 0.163 All Other Resources 24.683 EIEMA 24.683 FY 2014 ($M) FY 2014 ($M)
More informationU.S. Army Unified Capabilities Soft Client Subscription Service. AFCEA Belvoir Industry Days Town Hall April 3, 2018
U.S. Army Unified Capabilities Soft Client Subscription Service AFCEA Belvoir Industry Days Town Hall April 3, 2018 Problem Solution Overview Hybrid Cloud Software-as-a-Service TOPICS Consolidated Network
More informationNext Generation Enterprise Network- Recompete (NGEN-R) Industry Day
Next Generation Enterprise Network- Recompete (NGEN-R) Industry Day CAPT Michael Abreu Program Manager Naval Enterprise Networks (PMW-205) 25 January 2017 Topics Network as Mission Enabler Delivering Capability
More informationUNCLASSIFIED // FOUO Pegasus 101 Brief
Pegasus 101 Brief Multi-National Information Sharing Program Management Office March 2015 2 Outline Pegasus Defined Pegasus Requirements Pegasus Today Product / Service update Pegasus Improved Service
More informationMulti-Domain Command and Control
Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Multi-Domain Command and Control Brig Gen B. Chance Salty Saltzman Director Of Future Operations HAF/A3X 14 Mar 17 Overview
More informationCloud Overview. Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 UNITED IN SERVICE TO OUR NATION UNCLASSIFIED 1
Cloud Overview Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 1 DoD Cloud Deployment Models DoDIN On-Premise Commercial Cloud Commercially provided cloud service hosted within DoD facilities
More informationCloud-based Open Architecture Approach for Common Enterprise Ground Services
Cloud-based Open Architecture Approach for Common Enterprise Ground Services GSAW Conference Feb. 29-March 3, 2016 2016 by Booz Allen Hamilton. Published by The Aerospace Corporation with permission. Agenda
More informationHeadquarters U.S. Air Force
Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Military/Industry Partnerships in Building Toward A Resilient, Defensible Joint Information Environment Brig Gen Kim
More informationDeveloping a Sensing Strategy
Developing a Sensing Strategy Sylvia Mapes Branch Chief, DISA, ID53 18 Jun 2015 11 June 2015 1 What is sensing? Sensing provides the means to detect, interpret and correlate electronic communications activity.
More informationalign security instill confidence
align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed
More informationThe U.S. Coast Guard s Role in Cybersecurity
The U.S. Coast Guard s Role in Cybersecurity Mr. Thomas P. Michelli Deputy Chief Information Officer U.S. Coast Guard What is Cyberspace? Domain characterized by the use of electronics and the electromagnetic
More informationForecast to Industry Program Executive Office Mission Assurance/NetOps
Defense Information Systems Agency A Combat Support Agency Forecast to Industry Program Executive Office Mission Assurance/NetOps Mark Orndorff Director, PEO MA/NetOps 29 July 2010 What We Do We develop,
More informationSecuring Content in the Department of Defense s Global Information Grid
Securing Content in the Department of Defense s Global Information Grid Secure Knowledge Workshop State University of New York - Buffalo 23-24 September 2004 Robert W. McGraw Technical Director IA Architecture
More informationDefense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form
Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form Page 1 of 5 Submitted to DISA s DoD Cloud Support Office by: Signature (Prefer CAC
More informationDefense Information Systems Network (DISN) Test and Evaluation Network (DTEN)
Defense Information Systems Network (DISN) Test and Evaluation Network (DTEN) Mr. Dan Knodle Strategic Planning and Engineering Division Joint Interoperability Test Command 16 June 2011 Background Proliferation
More informationForecast to Industry 2017
Forecast to Industry 2017 Development and Business Center Mr. Alfred Rivera Director, Development and Business Center 6 November 2017 UNCLASSIFIED UNITED IN IN SERVICE TO OUR NATION Development & Business
More informationEnterprise Ground Services (EGS) Overview. SMC/AD Col Jim Planeaux GSAW Presentation 2 Mar 2016 Distribution A: Approved for Public Release
Space and Missile Systems Center Enterprise Ground Services (EGS) Overview SMC/AD Col Jim Planeaux GSAW Presentation 2 Mar 2016 Distribution A: Approved for Public Release 1 Key Drivers for EGS AFSPC Commander
More informationRisk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23
Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program Element 8.306 7.299 10.429-10.429 11.464 12.492 12.840 13.010 Continuing Continuing
More informationCyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation
Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense : February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development
More informationForecast to Industry 2016
Forecast to Industry 2016 Cyber Portfolio COL Brian Lyttle Program Executive Officer, Cyber 17 November 2016 UNCLASSIFIED 1 Our Mission Develop, integrate, and assure cyber capabilities in order to enable
More informationInformation Warfare Industry Day
Information Warfare Industry Day 20180510 RDML Barrett, OPNAV N2N6G TRANSPORT COMMERCIAL INTERNET DISN SCI Coalition Networks ADNS TELEPORT NMCI & ONE-NET JRSS MOC GNOC NCDOC USMC ISNS / CANES / SUBLAN
More informationEnterprise Network Modernization. Getting to JRSS. Joint Regional Security Stacks
Enterprise Network Modernization Getting to JRSS. Joint Regional Security Stacks Our Team Mr. Randall Conway Department of Defense Deputy Chief Information Officer for Information Enterprise (DCIO-IE)
More informationDISN Forecast to Industry. Ms. Cindy E. Moran Director for Network Services 8 August 2008
DISN Forecast to Industry Ms. Cindy E. Moran Director for Network Services 8 August 2008 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information
More informationEnterprise Services & Unified Capabilities Development & Delivery
Enterprise Services & Unified Capabilities Development & Delivery Karl Kurz Enterprise Services Development Division and UC Portfolio Chief Engineer October 2017 DoD Environment Goal State (DEOS) Current
More informationWelcome to the DISA Cloud Symposium
Welcome to the DISA Cloud Symposium 1 2 Information IN PERSON VIA QUESTION FORMS, SUBMITTED DURING BREAKS VIRTUAL INFORMATION PORTAL: http://www.disa.mil/newsandevents/events/cloud-symposium 3 DISA CLOUD
More informationInstallation Information Infrastructure Modernization Program (I3MP) LTC Robert J. Mikesh, Jr. Product Manager I3MP PEO EIS 29 JAN 14
Installation Information Infrastructure Modernization Program (I3MP) LTC Robert J. Mikesh, Jr. Product Manager I3MP PEO EIS 29 JAN 14 When You Behave as an Enterprise You Architect as an Enterprise and
More informationUNCLASSIFIED UNCLASSIFIED
: February 6 Exhibit R, RDT&E Budget Item Justification: PB : Research,, Test & Evaluation, / BA 5: System & Demonstration (SDD) COST ($ in Millions) FY 5 FY 6 R Program Element (Number/Name) PE 65A /
More informationDepartment of Defense Fiscal Year (FY) 2015 IT President's Budget Request Defense Contract Audit Agency Overview
BMA 3.308 Mission Area Business System Breakout Appropriation PROCUREMENT 1.594 Total 31.395 Defense Business Systems 3.528 EIEMA 28.087 All Other Resources 27.867 FY 2015 ($M) FY 2015 ($M) OPERATIONS
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationDepartment of Defense Unclassified Information Sharing Service (UISS) All Partners Access Network (APAN) History / Governance / Roles / Software /
Department of Defense Unclassified Information Sharing Service (UISS) All Partners Access Network (APAN) History / Governance / Roles / Software / Foundations Updated 02 Nov 2015 What is APAN? APAN is
More informationRSA NetWitness Suite Respond in Minutes, Not Months
RSA NetWitness Suite Respond in Minutes, Not Months Overview One can hardly pick up a newspaper or turn on the news without hearing about the latest security breaches. The Verizon 2015 Data Breach Investigations
More informationPerspectives on Cloud Computing
Perspectives on Cloud Computing Frank Konieczny AF Chief Technology Officer Warfighting Integration and Chief Information Officer May 2013 The Cloud Must Meet the mission requirements Provide a modern
More informationUnclassified. GIG Technologies. Rich Williams Acting Principal Director, GIG Engineering 8 August 2008
GIG Technologies Rich Williams Acting Principal Director, GIG Engineering 8 August 2008 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information
More informationGuidance and Policy For Department of Defense (DoD) Global Information Grid (GIG) Computing
1 2 Guidance and Policy For Department of Defense (DoD) Global Information Grid (GIG) Computing References: (a) DoD Chief Information Officer (CIO) Guidance and Policy Memorandum No.-8001-March 31, 2000-Global
More informationCyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS
Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported
More informationCisco Connected Factory Accelerator Bundles
Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment
More informationNavy Cyber Resilience
Unclassified Navy Cyber Resilience 20160614 Mr. Troy Johnson From cybersecurity to cyber resilience 2 Disconnected response through stove-piped assessments & initiatives across the enterprise: Operation
More informationJRSS. GPIs MNIS DMCC-S. Assured Identity NBIS. Joint Regional Security Stacks. Global Private Internets. Multinational Information Sharing
SummerLook 2018Book JRSS Joint Regional Security Stacks GPIs Global Private Internets MNIS Multinational Information Sharing DMCC-S DOD Mobility Classified Capability - Secret Assured Identity NBIS National
More informationT&E IN CYBERSPACE (UCR TESTING)
T&E IN CYBERSPACE (UCR TESTING) TRACK CHAIR COL Joe Puett CDR, JITC PRESENTER Richard Delgado Jr. TECHNOLOGY for RAPID ACQUISITION AND TEST Unified Capabilities Requirements (UCR) Testing Mr. Richard Delgado
More informationAir Force Digital Strategy
Air Force Digital Strategy Mr. Bill Marion Deputy Chief Information Officer 1 Protect IT Service Management Connect Compute/Store End Devices Data Workforce Compliance Business Innovation Next Gen Desktop
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationDOD Medical Device Cybersecurity Considerations
Enedina Guerrero, Acting Chief, Incident Mgmt. Section, Cyber Security Ops Branch 2015 Defense Health Information Technology Symposium DOD Medical Device Cybersecurity Considerations 1 DHA Vision A joint,
More informationSDDC CAMPAIGN PLAN OVERVIEW MILITARY SURFACE DEPLOYMENT AND DISTRIBUTION COMMAND
RF Y SU ACE D AR E IT MI L CAMPAIGN PLAN OVERVIEW R.E.A.D.Y. 2017-2020 Responsive to the Warfighter, Expeditionary - Fight Tonight, Agile Business Process-Audit Compliant, Delivering Readiness, Your Joint
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationForecast to Industry 2017
Forecast to Industry 2017 Joint Service Provider Maj Gen Brian T. Dravis, USAF Director, JSP 2017 UNCLASSIFIED UNITED IN IN SERVICE TO OUR NATION Enable. Every. Mission. Operate Innovate Defend Supports
More informationSecure Cloud Computing Architecture (SCCA)
Secure Cloud Computing Architecture (SCCA) Susan Casson PM, SCCA December 12, 2017 UNITED IN IN SERVICE TO OUR NATION 1 Unclassified DoD Commercial Cloud Deployment Approach Cyber Command C2 Operations
More informationEnabling Fast IT. In the IoE era. Alberto Degradi DCV Sales Leader. November 2014
Enabling Fast IT In the IoE era Alberto Degradi DCV Sales Leader November 2014 Agenda IT Challenges Today EMC + Cisco + Intel Cisco Unified Data Center Joint Data Center Solutions Cisco Confidential 2
More informationCloud-Enable Your District s Network For Digital Learning
Cloud-Enable Your District s Network For Digital Learning Session B40 BrainStorm 17.0 Gavin Lee Education Business Development Manager Juniper Networks gavinl@juniper.net Juniper Innovations for Mission
More informationDEPARTMENT OF THE AIR FORCE PRESENTATION TO THE SUBCOMMITTEE ON STRATEGIC FORCES U.S. HOUSE OF REPRESENTATIVES
NOT FOR PUBLICATION UNTIL RELEASED BY THE UNITED STATES HOUSE OF REPRESENTATIVES DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE U.S. HOUSE OF REPRESENTATIVES SUBJECT: Assuring National Security Space:
More informationBuilding a Resilient Security Posture for Effective Breach Prevention
SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.
More informationConsolidation Committee Final Report
Committee Details Date: November 14, 2015 Committee Name: 36.6 : Information Security Program Committee Co- Chairs: Ren Flot; Whitfield Samuel Functional Area: IT Functional Area Coordinator: Phil Ventimiglia
More informationRSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1
RSA Advanced Security Operations Richard Nichols, Director EMEA 1 What is the problem we need to solve? 2 Attackers Are Outpacing Defenders..and the Gap is Widening Attacker Capabilities The defender-detection
More informationCenturyLink for Microsoft
Strategic Partner Alliances CenturyLink for Microsoft EMPOWER REACH AGILITY 2017 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product names are the property
More informationAir Force Civil Engineer Center. Director s View. Randy Brown Director 4 May Battle Ready Built Right! 1
Air Force Civil Engineer Center Director s View Randy Brown Director 4 May 2017 Battle Ready Built Right! 1 AFCEC Organization Local Partners AFCEC Director AFLOA/JACE Deputy (JBSA-Lackland) Deputy (Tyndall)
More informationThe Perfect Storm Cyber RDT&E
The Perfect Storm Cyber RDT&E NAVAIR Public Release 2015-87 Approved for public release; distribution unlimited Presented to: ITEA Cyber Workshop 25 February 2015 Presented by: John Ross NAVAIR 5.4H Cyberwarfare
More informationMigrating Applications to the Cloud
Migrating Applications to the Cloud Mr. John Hale Chief, DISA Cloud Services May, 2018 1 Disclaimer The information provided in this briefing is for general information purposes only. It does not constitute
More informationSOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM
SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM OVERVIEW The Verizon 2016 Data Breach Investigations Report highlights that attackers are regularly outpacing the defenders.
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.1 August 13, 2004 ASD(NII)/DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: (a) DoD Directive 8500.1, "Information Assurance (IA),"
More informationCybersecurity Capabilities Overview
Cybersecurity Capabilities Overview Jack Wilmer Infrastructure Development Executive March 2016 Day in the Life of DISA INTERNET DoDIN DISN Operate DISA Provides, Operates and Assures the DODIN - $30 B
More informationEvolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha
Evolving the Security Strategy for Growth Eric Schlesinger Global Director and CISO Polaris Alpha Evolving the Security Strategy for Growth Where Do We Start? Our History, Making History In late 2016,
More informationDepartment of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Prisoner of War/Missing Personnel Office (DPMO) Overview
Mission Area Department of Defense Business System Breakout Appropriation All Other Resources 3.200 EIEMA 3.200 FY 2014 ($M) FY 2014 ($M) OPERATIONS 3.200 FY 2014 ($M) FY13 to FY14 Comparison ($M) FY2013
More informationUNCLASSIFIED LANDWARNET LandWarNet Unified Communications and Collaboration (UC&C) Update UNCLASSIFIED
LandWarNet 2011 Unified Communications and Collaboration (UC&C) Update What is UC&C? Why does the Army need UC&C? UC&C Requirements UC&C Challenges Unique to the DoD Current UC&C Status Timelines Activities
More informationDepartment of Defense Defense Information Enterprise Architecture Version 1.0 April 11, 2008
Department of Defense Defense Information Enterprise Architecture Version 1. April 11, 28 Prepared by: Department of Defense Office of the Chief Information Officer (This page intentionally left blank)
More informationDr. Eng. Antonio Mauro, PhD October 20th 2011
October 20th 2011 NIST Cloud Computing Reference Architecture NIST Cloud Computing Standards Roadmap Special Publication 500-292 September 2011 Document: NIST CCSRWG 092 - First Edition - July 5, 2011
More informationHow to Underpin Security Transformation With Complete Visibility of Your Attack Surface
How to Underpin Security Transformation With Complete Visibility of Your Attack Surface YOU CAN T SECURE WHAT YOU CAN T SEE There are many reasons why you may be considering or engaged in a security transformation
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Defense Information Systems Agency : February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationMPLS 101. Global Packet Transport Rollout. 2 Nov MPLS SharePoint Site: UNITED IN IN SERVICE TO OUR NATION UNCLASSIFIED
MPLS 101 Global Packet Transport Rollout MPLS SharePoint Site: http://go.usa.gov/x3vr5 2 Nov 2017 UNITED IN IN SERVICE TO OUR NATION 1 MPLS? Services It s a Technology Protocol 2 MPLS Layer-3 VPNs (AKA
More informationPMW 790 Shore And Expeditionary Integration Program Office NDIA San Diego Fall Industry Forum
PEOC4I.NAVY.MIL Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) PMW 790 Shore And Expeditionary Integration Program Office NDIA San Diego Fall Industry Forum
More informationDepartment of Defense Fiscal Year (FY) 2013 IT President's Budget Request Defense Technical Information Center Overview
Mission Area Department of Defense Business System Breakout Appropriation All Other Resources 19.083 EIEMA 19.083 RDT&E 19.083 FY 2013 ($M) FY 2013 ($M) FY 2013 ($M) FY12 to FY13 Comparision ($M) FY2012
More informationDepartment of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Advanced Research Projects Agency Overview
Mission Area Business System Breakout Appropriation BMA 0.027 Total 35.003 Defense Business Systems 0.027 All Other Resources 34.976 EIEMA 34.976 FY 2014 ($M) FY 2014 ($M) 35.003 FY 2014 ($M) FY13 to FY14
More informationNaval Enterprise Networks Industry Day #2 NGEN Re-compete Acquisition Approach
Naval Enterprise Networks Industry Day #2 NGEN Re-compete Acquisition Approach Philip M. Anderson Deputy Program Manager, PMW 205 25 May 2016 Agenda NGEN NGEN Re-compete (NGEN-R) Shaping the NGEN-R Industry
More informationInformation Sharing in the GIG Environment and the C2 Perspective
Information Sharing in the GIG Environment and the C2 Perspective 24 April 07 Precision Strike Conference People throughout the trusted, dependable and ubiquitous network are empowered by their ability
More informationDEFENSE LOGISTICS AGENCY
DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY Cyber Resilience Integration Mr. Linus Baker DLA Information Operations Director, Cybersecurity 1 Mission Assurance/Cybersecurity Concern
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationThe Challenge of Cyberspace Defense and CSSP Services
FOR OFFICIAL USE ONLY The Challenge of Cyberspace Defense and CSSP Services COL Dee Straub Chief, DISA Defensive Cyber Operations Mr. Paul Barbera Chief, DCO Plans & Requirements Mr. Rob Mawhinney Chief,
More information24 AF Requirements and Cyber Proving Ground Col Chad Nite Le Maire Col Timothy Chewy Franz 8 Dec 16
24 AF Requirements and The Maj Gen Benny Foulois Cyber Proving Ground Col Chad Nite Le Maire 24 AF/A5 Col Timothy Chewy Franz 318 COG/CC 8 Dec 16 Requirements Process and Vectoring Air Force Cyber Requirements
More informationAntiterrorism / Force Protection (AT/FP) Assessment Tool Training. Module 1: Policy Drivers for MARMS & AT/FP Assessments
Antiterrorism / Force Protection (AT/FP) Assessment Tool Training Module 1: Policy Drivers for MARMS & AT/FP Assessments Supporting Joint Staff J33 via US Army Armament, Research, Development and Engineering
More informationService Management. What an Acquisition Practitioner Needs to Know. Karen Gomez Defense Information Systems Agency Mission Support Division
Service Management DAU Symposium April 4, 2017 What an Acquisition Practitioner Needs to Know Karen Gomez Defense Information Systems Agency Mission Support Division 1 Topics DESMF The DESMF Realized Service
More informationCOMMERCIAL SOLUTIONS FOR CLASSIFIED CSfC
Within DISA, the CSfC Program Management Office (PMO) is working with DISA field offices, combatant commands, joint staff, and military services to enhance capabilities that support the vision of an enterprise
More informationSecure Cloud Computing Architecture (SCCA)
Secure Cloud Computing Architecture (SCCA) Program Overview Susan Casson PM, SCCA May 15, 2018 UNITED IN IN SERVICE TO OUR NATION 1 Service Overview: Why SCCA? SCCA connects the DoD to Infrastructure and
More informationEncryption Vision & Strategy
Encryption Vision & Strategy Brad Zehring Principal Product Manager Encryption Vision & Strategy 1 Safe Harbor Disclaimer This presentation contains information about pre-release software. Any unreleased
More informationJOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC)
JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC) Cyber T&E Initiatives AJ Pathmanathan JMETC Deputy PM for Engineering NCR Technical Director November 14, 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE
More informationRSA Solution Brief. The RSA Solution for Cloud Security and Compliance
The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance enables enduser organizations and service providers to orchestrate and visualize the security of their
More informationIntegrated C4isr and Cyber Solutions
Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a
More informationHOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS
HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network
More information21ST century enterprise. HCL Technologies Presents. Roadmap for Data Center Transformation
21ST century enterprise HCL Technologies Presents Roadmap for Data Center Transformation june 2016 21st Century Impact on Data Centers The rising wave of digitalization has changed the way IT impacts business.
More informationCisco Start. IT solutions designed to propel your business
Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they
More informationGDPR Update and ENISA guidelines
GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure
More informationDELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1
DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 MISSION-DRIVEN SOLUTIONS 2018 INTEGRATED INTEL SOLUTIONS ALL RIGHTS RESERVED MISSION-DRIVEN SOLUTIONS
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More information