24 AF Requirements and Cyber Proving Ground Col Chad Nite Le Maire Col Timothy Chewy Franz 8 Dec 16
|
|
- Helena Washington
- 6 years ago
- Views:
Transcription
1 24 AF Requirements and The Maj Gen Benny Foulois Cyber Proving Ground Col Chad Nite Le Maire 24 AF/A5 Col Timothy Chewy Franz 318 COG/CC 8 Dec 16
2 Requirements Process and Vectoring Air Force Cyber Requirements handled by 24 AF Arrive Top-Down and Bottom-up Short-term and Long-term needs Primarily 3 vectors based on urgency and available solutions RTOI Real Time Operations and Innovation (RTOI) less than 180 days conducted by organic 24 AF resources Rapid Cyber Acquisition Foundational Rapid less than 18 months conducted by AFLCMC Foundational greater than 18 months conducted by AFLCMC 2
3 What is Needed? The ability to better see the opportunities available Staying ahead of nimble adversaries and rapid tech changes Maintaining SA on innovation across industry, academia, govt The ability to better capitalize on those opportunities Tapping into disparate pools of innovators that already exist Overcoming Industrial Age acquisition processes The ability to field opportunities quickly Meeting Speed of Need via more collaborative partnerships Tighter integration of operator and ops commander early on Faster innovative application of warfighting capabilities Tighter partnerships with industry, academia, and government 3
4 We ve Been Here Before Lt Benny Foulois & Early Airpower Lockheed Skunk Works SMC Rapid Reaction Branch NRO Aerospace Data Facility Lab USAF Big Safari Each recognized the need to bring the right expertise together in order to provide more agile responses to the threats of their time. Each had to overcome internal processes in order to leap ahead of adversary advances. 4
5 Why Here? Why Now? We have the right people and organizations 24 AF / AFLCMC We have the right authorities Rapid Cyber Acquisition/Real-time Ops & Innovation We have many of the relationships already DoD, National Labs, Commercial, Academia It is a low cost of entry Most processes, personnel, equipment in place Lends naturally to consider a proving ground concept 5
6 Cyber Proving Ground - Vision Accelerate transition of advanced cyber concepts and emerging technologies to the operational community by leveraging innovative efforts across industry, academia, national labs, operators, and other visionaries. Think Big, Start Small, Scale Fast 6
7 CPG A Marriage of Two Organizations 24 AF/318 COG Brings to the CPG Matured RTO&I Processes/Authorities ECT Leads, Integrators, Developers Test/Assessment Assets Robust Range/Mod-Sim Environments Classified Foundry Floors Close relationship w/ Ops Community AFLCMC/HNC Brings to the CPG Acquisition Expertise/Authorities Strong ties to the SPO Community Especially Cyber WS teams Matured partnership processes Unclassified Foundry Floor Experience in Ops capability delivery UNCLASSIFIED 7
8 General CPG Construct Emerging Concept s Collection of Emerging Concept s (ECT) that: Stand-up for short periods of time (<6 months) Partner w/ external developers, innovators, operators Develop new innovative concepts/solutions Test, Assess, otherwise Prove existing innovations Transition that: Facilitates getting CPG results back to innovators Works w/ operators to quickly field CPG solutions Coordinates with SPOs for sustainment/hand-off Transition The ORACLE An Operator Research and Library Element that: Maintains active awareness of emerging tech/concepts Connects ECTs with industry, academia, other govt Conducts research in support of active CPG projects 8
9 CPG Operating Concept Academia Government Commercial FFRDCs Emerging Technologies & Concepts (across S&T, R&D, STEM Communities) Maintain Awareness Actively Engage The ORACLE (Operator Research And Cyber Library Element) Maintain Awareness Threats Emergent AFCYBER Combatant Commands USCYBERCOM Warfighter Requirements Operations Community Collaboration / Participation Emerging Concept s Collaboration / Participation Foundry Floor Cyber Proving Environment (CPE) Connections to other cyber environments (as needed) 9
10 CPG Operating Concept Academia Government FFRDCs Commercial Emerging Technologies & Concepts (across S&T, R&D, STEM Communities) Maintain Awareness Actively Engage The ORACLE (Operator Research And Cyber Library Element) Maintain Awareness Threats Emergent AFCYBER Combatant Commands USCYBERCOM Warfighter Requirements Operations Community Provide to Emerging Concept : Awareness of req mnts/intel Awareness of emerging tech/concepts Focused research support Emerging Concept s Transition More Dev TT Facilitates: - Transition back to Developer - Continued Awareness by The ORACLE Foundry Floors Cyber Proving Environment (CPE) Connections to other cyber environments (as needed) To the Field Transition TT Facilitates: - Initial Fielding Sppt - Sustainment Handoff 10
11 Range of CPG Projects Problem Analysis Technical Evaluations Military Utility Assessments Capability Demonstrations EXAMPLES ONLY This list is neither comprehensive nor mutually exclusive. Each EGT is tailored to meet its specific project requirements. Technology Challenges Operational Testing/Assessments Grass-Roots Innovation & Integration 11
12 CPG Project Entry Industry Academia TDIs Other Govt CNFs CC Directed FFRDCs RTO&Is TASRs External Innovation Opportunities HHQ Taskings Evaluates Opportunities Recommends to CPG OMB Warfighter Requirements New Project Proposal Sets Priority Schema Steering Group Plans & Strategies Informed By Determines Feasibility Establishes Priority Leadership Element (CPG Ops Management Board) Resources 12
13 Where We Are Today Emerging Concept s Academia Government Commercial FFRDCs Emerging Technologies & Concepts (across S&T, R&D, STEM Communities) ECTs currently in operation across OCO, DCO, and C2 CPG Projects: 23 On-going, 19 in Hopper Heavy on grass-roots innovation / test & assessments Few MUAs and Fly Offs at this time (this will change) Not leveraging industry and academia enough! Strengthening relationships with ops community Operations Community Collaboration / Participation Emerging Concept s Collaboration / Participation 13
14 Where We Are Today Foundry Floors / Cyber Proving Environment Classified FF Classified FF Several classified Foundry Floors already in place Supporting various ECTs across JBSA Unclassified Foundry Floor in build stage ETC: Mid CY2017 Robust CPE currently supports existing ECTs Leverages in-place JIOR and TexNet conduits to partner externally CPE will extend out to Unclassified FF Unclassified FF Classified Foundry Floor Cyber Proving Environment (CPE) Connections to other cyber environments 14
15 Where We Are Today Transition s Interim Transition comprised of a few AFLCMC personnel Bring resident acquisition/sustainment expertise Have pre-existing relationships with Cyber SPOs Currently working select CPG Projects as they complete in order to pilot processes Establishing relationships with, learning processes of, newer transition partners CYBERCOM, SOCOM, Non-cyber weapon system SPOs Other developer organizations (Currently government, expanding to non-gov) Developing/Codifying processes for different transition paths Will require more work on partnership mechanisms such as CRADAs and MOUs Transition More Dev TT Facilitates: - Transition back to Developer - Continued Awareness by The ORACLE Foundry Floor To the Field Transition TT Facilitates: - Initial Fielding Sppt - Sustainment Handoff 15
16 Where Are We Today The ORACLE Academia Government FFRDCs Commercial Emerging Technologies & Concepts (across S&T, R&D, STEM Communities) Maintain Awareness Actively Engage The ORACLE (Operator Research And Cyber Library Element) Maintain Awareness Threats Emergent AFCYBER Combatant Commands USCYBERCOM Warfighter Requirements Operations Community Emerging Concept s Provide to ECTs: Awareness of req mnts/intel Awareness of emerging tech/concepts Focused research support The most complex of the CPG elements and the least mature Flying as we Build Piloting several projects, expanding external opportunities Several Elements External Engagements Front Door Operations Project Adjudication and Validation Element Library and Research 16
17 Key Challenge Getting Innovation to the CPG Academia Government FFRDCs Commercial Emerging Technologies & Concepts (across S&T, R&D, STEM Communities)? Seeing Opportunities Organizing current relationships more effectively Identifying forums/orgs w/ broad networks Identifying those non-traditional opportunities Capitalizing on Opportunities Partnering mechanisms that meet speed of need For the operator And for the Innovator! Foundry Floor Cyber Proving Environment (CPE) Connections to other cyber environments 17
18 Key Challenge Getting Innovation to the CPG Legal/Policy Questions: How does CPG maintain awareness of external innovation? How does CPG share requirements with industry and academia? How does CPG select innovative opportunities to prove? If proven an immediate solution, how does CPG transition quickly to the field? If an enduring, long-term solution, how do we sustain it? If more development is required, how do we: Partner with other innovators? Transition to long-term development? Maintain awareness of future progress? Legal/Policy Considerations: Security Classification and Clearances Consideration of giving Unfair Advantage Protecting Proprietary Information Partnering Vehicles (OTAs, CRADAs, Contracts, etc.) Scalability of Solution Sustainability of Solution Sustainer of Solution (SPO, CDG, Other) 18
19 Wrap-up and So What CPG executing today under existing processes as we Further matrix personnel from 24AF and AFLCMC Codify critical processes and C2 structure Identify/prioritize new projects to pilot Determine loadshare of responsibilities, funding, etc. Why of interest to you? CPG is a resource to leverage today; capability will grow Will provide broad SA of innovation efforts across academia, government, and industry Lessons we learn may serve as a model for similar efforts within other Services IOC Now, FOC Expected Early CY17 19
20 IOC Now, FOC Expected Early CY17
21 Cyber Proving Ground (OV-1) Academia Government Commercial Emerging Technologies & Concepts (across S&T, R&D, STEM Communities) Collaboration / Participation FFRDCs Maintain Awareness Steering Group (Oversight & Priorities) Leadership Element (Operations) Actively Engage Emerging Concept s The ORACLE (Operator Research And Cyber Library Element) Provide to ECTs: Maintain Awareness Awareness of req mnts/intel Awareness of emerging tech/concepts Focused research support Threats Emergent AFCYBER Combatant Commands Urgent Requirements Collaboration / Participation USCYBERCOM Operations Community Coordination & Handoff Foundry Floors Transition Cyber Proving Environment (CPE) Connections to other cyber environments (as needed) Security Classification Sustainment Ops Manuals Training 21
22 CPG A Marriage of Two Organizations Brings to the CPG Matured RTO&I Processes/Authorities EGT Leads, Integrators, Developers Test/Assessment Assets Robust Range/ModSim Environments Classified Foundry Floors Close relationship w/ Ops Community Shortfalls External partnerships proactive and strong, but scattered and unorganized Lack of acquisition expertise Limited ties to the SPO community Brings to the CPG Acquisition Expertise/Authorities Strong ties to the SPO Community Especially Cyber WS teams Matured partnership processes Already moved out on Unclass FF Immediate funding for buildout Shortfalls External partnerships primarily based on passive communication Limited EGT manpower Limited Range/ModSim Assets 22
23 CPG Operating Concept Academia Government Commercial FFRDCs Emerging Technologies & Concepts (across S&T, R&D, STEM Communities) Maintain Awareness Actively Engage The ORACLE (Operator Research And Cyber Library Element) Maintain Awareness Threats Emergent AFCYBER Combatant Commands USCYBERCOM Warfighter Requirements Operations Community Collaboration / Participation Emerging Concept s Collaboration / Participation Foundry Floor Cyber Proving Environment (CPE) Connections to other cyber environments (as needed) 23
24 CPG Operating Concept Academia Government FFRDCs Commercial Emerging Technologies & Concepts (across S&T, R&D, STEM Communities) Maintain Awareness Actively Engage The ORACLE (Operator Research And Cyber Library Element) Maintain Awareness Threats Emergent AFCYBER Combatant Commands USCYBERCOM Warfighter Requirements Operations Community Provide to Emerging Concept : Awareness of req mnts/intel Awareness of emerging tech/concepts Focused research support Emerging Concept s Transition More Dev TT Facilitates: - Transition back to Developer - Continued Awareness by The ORACLE Foundry Floor Cyber Proving Environment (CPE) Connections to other cyber environments (as needed) To the Field Transition TT Facilitates: - Initial Fielding Sppt - Sustainment Handoff 24
Shaping the Department of Defense Engineering Workforce
Shaping the Department of Defense Engineering Workforce Ms. Aileen Sedmak Office of the Deputy Assistant Secretary of Defense for Systems Engineering 20th Annual NDIA Systems Engineering Conference Springfield,
More informationDefense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility
Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous
More informationSymantec Data Center Transformation
Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments
More informationAdvancing Sustainment through Public-Private Partnership
Air Force Sustainment Center Advancing Sustainment through Public-Private Partnership Mr. Earl Williams AFSC/LGXB 21 August 2017 Version 1 1 Overview Public-Private Partnerships Public-Private Partnerships
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationI n t e g r i t y - S e r v i c e - E x c e l l e n c e
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e AF Chief Information Security Officer (CISO) Mr. Pete Kim (SES)
More informationSystems 2020 Strategic Initiative Overview
Systems 2020 Strategic Initiative Overview Kristen Baldwin ODDR&E/Systems Engineering 13 th Annual NDIA Systems Engineering Conference San Diego, CA October 28, 2010 Oct 2010 Page-1 DISTRIBUTION STATEMENT
More informationAcquisition and Intelligence Community Collaboration
Acquisition and Intelligence Community Collaboration Kristen Baldwin Deputy Director, Software Engineering and System Assurance Office of the Deputy Under Secretary of Defense (Acquisition and Technology)
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program Element 8.306 7.299 10.429-10.429 11.464 12.492 12.840 13.010 Continuing Continuing
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior
More informationCyberspace: New Frontiers in Technology Insertion
Cyberspace: New Frontiers in Technology Insertion Dr. John S. Bay, ST Chief Scientist, Air Force Research Laboratory, Information Directorate AFRL Structure AFRL Maj Gen C Bedke Staff XP Air Vehicles Space
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationAdvanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin
Advanced Technology Academic Research Council Federal CISO Summit Ms. Thérèse Firmin Acting Deputy DoD CIO Cyber Security Department of Defense 25 January 2018 2 Overview Secretary Mattis Priorities Cybersecurity
More informationUSSTRATCOM Global C2. Mr Dave Gelenter USSTRATCOM/J86 Mar This Briefing is UNCLASSIFIED
USSTRATCOM Global C2 Mr Dave Gelenter USSTRATCOM/J86 Mar 2006 This Briefing is The Vision Our objective is a global, persistent, 24/7 collaborative environment-comprising people, systems, and tools. Our
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationRocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency
Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities
More informationUNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / Software Engineering Institute (SEI) Applied Research. Prior Years FY 2013 FY 2014
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior Years
More informationHeadquarters U.S. Air Force. NDIA Division Planning Meeting AF Recommended Initiatives for CY2017
Headquarters U.S. Air Force NDIA Division Planning Meeting AF Recommended Initiatives for CY2017 Col(s) Laird Abbott SAF/AQRE December 2016 Air Force Enterprise Strategic Direction Key Leadership Focus
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationCyber Challenges and Acquisition One Corporate View
Sentar Inc 315 Wynn Dr Huntsville, AL 35805 256-430-0860 www.sentar.com Cyber Challenges and Acquisition One Corporate View Defense Acquisition University Conference Huntsville, AL February 22-23, 2011
More informationCloud Overview. Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 UNITED IN SERVICE TO OUR NATION UNCLASSIFIED 1
Cloud Overview Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 1 DoD Cloud Deployment Models DoDIN On-Premise Commercial Cloud Commercially provided cloud service hosted within DoD facilities
More informationCybersecurity in Acquisition
Kristen J. Baldwin Acting Deputy Assistant Secretary of Defense for Systems Engineering (DASD(SE)) Federal Cybersecurity Summit September 15, 2016 Sep 15, 2016 Page-1 Acquisition program activities must
More informationSpace Cyber: An Aerospace Perspective
Space Cyber: An Aerospace Perspective USAF Cyber Vision 2025 AFSPC 19-21 March 2012 Frank Belz and Joe Betser The Aerospace Corporation Computers and Software Division 20 March 2012 frank.belz@aero.org
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete
More informationRegional Resilience: Prerequisite for Defense Industry Base Resilience
Regional Resilience: Prerequisite for Defense Industry Base Resilience Paula Scalingi, Director Pacific Northwest Center for Regional Disaster Resilience Vice Chair, The Infrastructure Security Partnership
More informationFAA Cybersecurity Test Facility (CyTF) By: Enterprise Information Security Team ANG-B31 Patrick Hyle, William J Hughes Technical Center
FAA Cybersecurity Test Facility (CyTF) By: Enterprise Information Security Team ANG-B31 Patrick Hyle, William J Hughes Technical Center Date: 08 August, 2016 1 2 3 4 5 6 7 8 2 FAA Provides Aviation Portion
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Defense Security Service Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development COST
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationHeadquarters U.S. Air Force. NDIA Division Planning Meeting AF Outlook for CY2016
Headquarters U.S. Air Force NDIA Division Planning Meeting AF Outlook for CY2016 Col(s) Colin Tucker SAF/AQRE 09 December 2015 Topics Rapid acquisition Intellectual Property and Data Rights Development
More informationManufacturing Cybersecurity Cooperative Overview
Manufacturing Cybersecurity Cooperative Overview December 12, 2017 Chris Conrardy CTO and VP Strategic Initiatives, EWI cconrardy@ewi.org 614-688-5191 John Gilbert VP Strategic Planning, Blake Philips
More informationJoint Information Environment
Joint Information Environment 28 May 14 1 Agenda JIE Necessity DISA s JIE Focus Takeaways Introduction of Breakout Session Leads DoD IT Future: Joint Information Environment A secure joint information
More informationMulti-Domain Command and Control
Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Multi-Domain Command and Control Brig Gen B. Chance Salty Saltzman Director Of Future Operations HAF/A3X 14 Mar 17 Overview
More informationNew Zealand Government IbM Infrastructure as a service
New Zealand Government IbM Infrastructure as a service Global leverage / local experts World-class Scalable Agile Flexible Fast Secure What are we offering? IBM New Zealand Government Infrastructure as
More informationIntegrated C4isr and Cyber Solutions
Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a
More informationCONCLUSIONS AND RECOMMENDATIONS
Chapter 4 CONCLUSIONS AND RECOMMENDATIONS UNDP and the Special Unit have considerable experience in South-South cooperation and are well positioned to play a more active and effective role in supporting
More informationMaking hybrid IT simple with Capgemini and Microsoft Azure Stack
Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.
More informationInformation Technology Information Sharing and Analysis Center. First Symposium Barcelona, Spain Feb. 2, 2011
Information Technology Information Sharing and Analysis Center First Symposium Barcelona, Spain Feb. 2, 2011 About Us Non Profit, US Corporation established in 2000 and operational in 2001 Fully funded
More informationNational Information Assurance Partnership (NIAP) 2017 Report. PPs Completed in CY2017
National Information Assurance Partnership (NIAP) 2017 Report NIAP continued to grow and make a difference in 2017 from increasing the number of evaluated products available for U.S. National Security
More informationThe Perfect Storm Cyber RDT&E
The Perfect Storm Cyber RDT&E NAVAIR Public Release 2015-87 Approved for public release; distribution unlimited Presented to: ITEA Cyber Workshop 25 February 2015 Presented by: John Ross NAVAIR 5.4H Cyberwarfare
More informationEngineered Resilient Systems Advanced Analytics and Modeling in Support of Acquisition
Engineered Resilient Systems Advanced Analytics and Modeling in Support of Acquisition David R. Richards Lead Technical Director for ERS US Army Engineer Research and Development Center (ERDC) Research
More informationUnited States Air Force
United States Air Force AF Community Partnership Program Public-Public; Public-Private (P4) Partnerships Leveraging military installation and local community capabilities and resources to obtain value
More informationENTERPRISE ARCHITECTURE FOR THE AIR FORCE SATELLITE CONTROL NETWORK
ENTERPRISE ARCHITECTURE FOR THE AIR FORCE SATELLITE CONTROL NETWORK Raul J. Diaz USAF, 50 th Network Operations Group, raul.diaz@us.af.mil ABSTRACT Our cultural expectation about technology continually
More informationUNCLASSIFIED FY 2016 OCO. FY 2016 Base
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology Development
More informationSTRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government
ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents
More informationDefense Engineering Excellence
Defense Engineering Excellence Kristen J. Baldwin Principal Deputy Office of the Deputy Assistant Secretary of Defense for Systems Engineering, OUSD(AT&L) 18th Annual NDIA Systems Engineering Conference
More informationAvionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment
Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment 26 January 2017 Presented by: Mr. Chad Miller NAVAIR Cyber T&E What: Replicate Cyber Battlespace
More informationBundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved. FlyntGroup.
Bundling Arrows: Making a Business Case for Adopting an Incident Command System (ICS) 2012 The Flynt Group, Inc.; All Rights Reserved FlyntGroup.com Flynt Group White Paper Bundling Arrows: Making a Business
More informationPROVIDING THE WARFIGHTER S EDGE
20150303_AFCEA_New_Horizons_v5 PA Approved (Releasable version) AFCEA BOSTON NEW HORIZONS Lt Gen John Thompson Commander 3 March 2015 PROVIDING THE WARFIGHTER S EDGE Enduring Life Cycle Management Framework
More informationNational Cybersecurity Center of Excellence
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Briefing to ITEA Cyber Workshop 29 March 2017 STRATEGY VISION ADVANCE CYBERSECURITY
More informationCyber Partnership Blueprint: An Outline
Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.
More informationSTRATEGIC PLAN. USF Emergency Management
2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa
More informationInternational SOF Coordination Center (ISCC)
International SOF Coordination Center (ISCC) 19 th ICCRTS 17 June 2014 Paper ID 004 Mr. Ken D. Teske Mr. Michael D. Tisdel Mr. William C. Fleser 1 Agenda The Concept The OV-1 View Required Capabilities
More informationALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT
THOUGHT PIECE ALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT Brad Stone Vice President Stone_Brad@bah.com Brian Hogbin Distinguished Technologist Hogbin_Brian@bah.com
More informationSDDC CAMPAIGN PLAN OVERVIEW MILITARY SURFACE DEPLOYMENT AND DISTRIBUTION COMMAND
RF Y SU ACE D AR E IT MI L CAMPAIGN PLAN OVERVIEW R.E.A.D.Y. 2017-2020 Responsive to the Warfighter, Expeditionary - Fight Tonight, Agile Business Process-Audit Compliant, Delivering Readiness, Your Joint
More informationFXM Swedish Defence and Security Export Agency Exports and international cooperation for our future defence
FXM Swedish Defence and Security Export Agency Exports and international cooperation for our future defence FXM 215x215_ENG_D.indd 1 2013-06-25 13.16 Our mission is to promote Swedish defence exports when
More informationPEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY. New Brunswick Growth Opportunity. Cybersecurity
PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY New Brunswick Growth Opportunity New Brunswick Growth Opportunity Province of New Brunswick PO 6000, Fredericton NB E3B 5H1 Canada ISBN 978-1-4605-1669-0
More informationSRS Overview. Dave Hepner. Looking toward the future of the Savannah River Site
SRS Overview Looking toward the future of the Savannah River Site Dave Hepner Department of Energy-Savannah River Director, Acquisition Operations Division Savannah River Site March 19, 2012 SRS: We know
More informationQuality Collaboration Across Government and Industry in a Time of Profound Changes
Quality Collaboration Across Government and Industry in a Time of Profound Changes 2018 CQSDI March 12 2018 Todd Nygren Corporate Chief Engineer 2018 The Aerospace Corporation Compelling Time of Change
More informationReshaping the future, shifting business and operating models
Safe Harbor Certain statements mentioned in this presentation concerning our future growth prospects are forward-looking statements regarding our future business expectations intended to qualify for the
More informationDefensive Cyber Operations Industry Overview 3 APR 18
Defensive Cyber Operations Industry Overview 3 APR 18 LTC Scott Helmore UNCLASSIFIED Introduction Welcome Transforming I3C2 to DCO Themes: Innovation Secure Communications Collaboration WWII was won with
More informationAir Force Acquisition
Headquarters U.S. Air Force Air Force Acquisition Dr. Bill LaPlante Assistant Secretary of the Air Force (Acquisition) 1 USAF Acquisition Priorities Get the high priority programs right & keep them on
More informationDLA Energy Panel: Energy Resiliency and Assurance
DLA Energy Panel: Energy Resiliency and Assurance U.S. Air Force Office of Energy Assurance Mr. Shawn Bennett, Senior Advisor 12 April 2017 Installation Energy Is Mission Critical AVIATION ~5,517 Aircraft
More informationSMART. Investing in urban innovation
SMART Investing in urban innovation What Smart Belfast? Belfast has ambitious plans for the future. Building on our economic revival, we want to make our city an outstanding place to live, work and invest.
More informationNDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly.
NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly. Dunlap@Raytheon.com This document does not contain technology or Technical Data controlled
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($ in Millions)
More informationRESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016
RESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016 HunterNet Co-Operative Limited T: 02 4908 7380 1 P a g e RESPONSE TO 2016 DEFENCE WHITE PAPER APRIL 2016 Project Manager Marq Saunders, HunterNet Defence
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationConnected & Automated Vehicle Activities
MDOT State Highway Administration Connected & Automated Vehicle Activities National Rural ITS Conference October 2018 MDOT s CAV Working Group MDOT s CAV Working Group Open discussions on CAV with TBUs,
More informationData Governance Quick Start
Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry
More informationDSS in Transition RMS Pilot
DSS in Transition RMS Pilot Raytheon Company Global Security Services Greg Garcia November 15, 2017 Copyright 2017 Raytheon Company. All rights reserved. Agenda DSS in Transition Evolving with the Threat
More informationAn Accelerated Approach to Business Capability Acquisition for the Montgomery IT Summit. Presented by: Mr. Paul Ketrick May 19, 2009
An Accelerated Approach to Business Capability Acquisition for the Montgomery IT Summit Presented by: Mr. Paul Ketrick May 19, 2009 2 IT Acquisition Issues Main issue observed that DoD software programs
More informationControl Systems Cyber Security Awareness
Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security
More informationChallenges and Opportunities in Cyber Physical System Research
Homeland Security Advanced Research Projects Agency Challenges and Opportunities in Cyber Physical System Research Dec 11, 2013 ACSAC Panel Dr. Dan Massey Program Manager Cyber Security Program Areas Trustworthy
More informationRhode Island Air National Guard. Current Cyber Landscape
Rhode Island Air National Guard Current Cyber Landscape This Overall Classification of this Briefing is: //FOUO Major Christopher Allen 1 Executive Direction Presidential Policy Directive/PPD-21 Critical
More informationUS Air Force Initiative to Enhance Hypersonic Test Capabilities
Air Force Materiel Command US Air Force Initiative to Enhance Hypersonic Test Capabilities Col Tim West Senior Materiel Leader, Test Ops Division Arnold Engineering Development Complex 32 nd Annual NDIA
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: Applied Research COST ($
More informationEnterprise Ground Services (EGS) Overview. SMC/AD Col Jim Planeaux GSAW Presentation 2 Mar 2016 Distribution A: Approved for Public Release
Space and Missile Systems Center Enterprise Ground Services (EGS) Overview SMC/AD Col Jim Planeaux GSAW Presentation 2 Mar 2016 Distribution A: Approved for Public Release 1 Key Drivers for EGS AFSPC Commander
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationGrow Your Services Business
Grow Your Services Business Cisco Services Channel Program One Experience. Expanding Opportunities. Expand Your Services Practice More Profitably Together with Cisco Our customers face tough business
More informationImplementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs
Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs Philomena Zimmerman Office of the Deputy Assistant Secretary of Defense for Systems Engineering
More informationRSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief
RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing
More informationSmart Data Center Solutions
Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,
More informationCyber T&E Standards Panel
Cyber T&E Standards Panel Why Cyber T&E Standards? Mr. George Wauer, Touchstone POCs, LLc Test and Training Enabling Architecture (TENA) Mr. Gene Hudgins, TRMC Cyber Range Environment VV&A Mr. Ryan Kelly,
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationTHE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD
OVERVIEW Accenture is in the process of transforming itself into a digital-first enterprise. Today, Accenture is 80 percent in a public cloud. As the journey continues, Accenture shares its key learnings
More informationFinancing resilience at the subnational 22 JUNE 2014 STANDING COMMITTEE ON FINANCE FORUM, MONTEGO BAY, JAMAICA
Financing resilience at the subnational level in South Africa 22 JUNE 2014 STANDING COMMITTEE ON FINANCE FORUM, MONTEGO BAY, JAMAICA My key takeaways from 21 June 2014 1. Improve access to finance through
More informationJoint Federated Assurance Center (JFAC): 2018 Update. What Is the JFAC?
21 st Annual National Defense Industrial Association Systems and Mission Engineering Conference Joint Federated Assurance Center (JFAC): 2018 Update Thomas Hurt Office of the Under Secretary of Defense
More informationLevel 3 is the largest competitive local exchange carrier (CLEC) operating in the US. Volume 1, Section 1.0 Page 1-1 April 19, 2007
1.0 Level 3 s WITS 3 Offer Level 3 Communications, LLC (Level 3) is committed to a future where Government agencies can conduct their business cost effectively by leveraging converged multi-media IP applications.
More informationInformation Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure
Information Infrastructure and Security The value of smart manufacturing begins with a secure and reliable infrastructure The Case for Connection To be competitive, you must be connected. That is why industrial
More informationImplementing Executive Order and Presidential Policy Directive 21
March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy
More informationBest practices in IT security co-management
Best practices in IT security co-management How to leverage a meaningful security partnership to advance business goals Whitepaper Make Security Possible Table of Contents The rise of co-management...3
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More information21ST century enterprise. HCL Technologies Presents. Roadmap for Data Center Transformation
21ST century enterprise HCL Technologies Presents Roadmap for Data Center Transformation june 2016 21st Century Impact on Data Centers The rising wave of digitalization has changed the way IT impacts business.
More informationInnovate UK energy strategy - Rob Saunders A joint approach - Christian Inglis The energy systems catapult - Nick Smailes Project Presentations
Our changing energy systems: Supporting innovation Innovate UK energy strategy - Rob Saunders A joint approach - Christian Inglis The energy systems catapult - Nick Smailes Project Presentations May 2015
More informationCyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS
Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported
More informationStrategic & Operational Planning:
Strategic & Operational Planning: 2017-2022 March 2018 Version 3 Version 3 ESTABLISHMENT OF NESTcc The National Evaluation System for health Technology Coordinating Center (NESTcc) was established in 2016
More informationTest Resource Management Center Directed Energy T&E Conference A Joint DEPS ITEA Event
Test Resource Management Center Directed Energy T&E Conference A Joint DEPS ITEA Event Mr. George Rumford Deputy Director Major Initiatives and Technical Analyses Test Resource Management Center January
More informationASREN Arab States Research and Education Network
ASREN Arab States Research and Education Network IPv6 & NREN Internet2 Middle East Regional Interest Group Meeting Amman Jordan 13 Dec. 2011 Alaa AL-Din Al-Radhi IPv6, Cyber Security & Emerging Technologies:
More informationNorth Carolina Visit and Assessment Tom Clarke Vice President for Research and Technology National Center for State Courts
North Carolina Visit and Assessment Tom Clarke Vice President for Research and Technology National Center for State Courts Paul Embley Chief Information Officer National Center for State Courts January
More informationMicro Focus Partner Program. For Resellers
Micro Focus Partner Program For Resellers Contents Micro Focus Today About Micro Focus Our solutions for digital transformation Products and Solutions Program Membership Tiers Become a Portfolio Expert
More information