NNSA Security Roadmap

Similar documents
Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

THE POWER OF TECH-SAVVY BOARDS:

Office of Acquisition Program Management (OAPM)

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Practical IT Research that Drives Measurable Results OptimizeIT Strategic Planning Bundle

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

MNsure Privacy Program Strategic Plan FY

Federal-State Connections: Opportunities for Coordination and Collaboration

SDDC CAMPAIGN PLAN OVERVIEW MILITARY SURFACE DEPLOYMENT AND DISTRIBUTION COMMAND

State of South Carolina Interim Security Assessment

SAN JOSÉ FIRE DEPARTMENT. Strategic Planning

The US National Near-Earth Object Preparedness Strategy and Action Plan

Department of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Media Activity Overview

SRS Overview. Dave Hepner. Looking toward the future of the Savannah River Site

Health Information Technology - Supporting Joint Readiness

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com

Cybersecurity. Securely enabling transformation and change

Security in Today s Insecure World for SecureTokyo

Defense Engineering Excellence

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

Airmen & community support missions. Two decades of taking risk in infrastructure created a fiscally unsustainable posture.

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

Which Side Are You On?

Dell helps you simplify IT

TDWI Data Governance Fundamentals: Managing Data as an Asset

INFORMATION ASSURANCE DIRECTORATE

Security and Privacy Governance Program Guidelines

ITIL 4. Public Frequently Asked Questions (FAQs) AXELOS.com. October 2018 COMMERCIAL IN CONFIDENCE

Cyber Partnership Blueprint: An Outline

AUDIT UNITED NATIONS VOLUNTEERS PROGRAMME INFORMATION AND COMMUNICATION TECHNOLOGY. Report No Issue Date: 8 January 2014

WHO-ITU National ehealth Strategy Toolkit

Symantec Data Center Transformation

TX CIO Leadership Journey Texas CIOs Bowden Hight Texas Health and Human Services Commission Tim Jennings Texas Department of Transportation Mark

Avoid a DCIM Procurement Disaster

Reviewed by ADM(RS) in accordance with the Access to Information Act. Information UNCLASSIFIED.

Professional Services for Cloud Management Solutions

Update: IQ Certification Program UALR/IAIDQ

Nuclear Weapon Complex Transformation

CenturyLink for Microsoft

College of Agricultural Sciences UNIT STRATEGIC PLANNING UPDATES MARCH 2, Information Technologies

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

AVP/CIO IT Candidate Campus Visit Friday, April 17, 2015 Mr. Kenneth Ihrer

2016 NCCA Standards Revisions Recap and Takeaways: What You Need to Know

INFORMATION TECHNOLOGY ONE-YEAR PLAN

IT Risk & Compliance Federal

The Fine Art of Creating A Transformational Cyber Security Strategy

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

CERTIFICATION KNOWLEDGE. STANDARDS. EXCELLENCE. APMP.ORG

DISDI Plenary Session

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

Impact of Enterprise Security Risk Assessments on Integrators & Manufacturers. J. Kelly Stewart Steve Oplinger James Marcella

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Research Infrastructures and Horizon 2020

Competency Definition

DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

State of Security Operations

ENTERPRISE ARCHITECTURE FOR THE AIR FORCE SATELLITE CONTROL NETWORK

Improving Data Governance in Your Organization. Faire Co Regional Manger, Information Management Software, ASEAN

The University of Queensland

Project Management Professional (PMP) 5-Day Training Program June 4 8, 2018 Cost: $ GST (Book Included) Based on PMI PMBOK 6 th Edition

STRATEGIC PLAN. USF Emergency Management

IT Strategic Planning: Making Your IT Organization Efficient and Effective

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

Accelerate Your Enterprise Private Cloud Initiative

CAPM TRAINING EXAM PREPARATION TRAINING

STRATEGIC PLAN

Continuous Monitoring and Incident Response

Position Description IT Auditor

Check against delivery

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs

ELECTRICAL ENGINEERING & INSTRUMENTATION MECHANICAL ENGINEERING BIOLOGICAL & INDUSTRIAL ENGINEERING NUCLEAR ENGINEERING STRUCTURAL & CIVIL

Oregon Fire Service Conference Enterprise Security Office Update. October 26, 2018

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Forecast to Industry 2017

OneUConn IT Service Delivery Vision

How To Build or Buy An Integrated Security Stack

DRAFT. IT Services Strategic Plan

SPAWAR FLEET READINESS DIRECTORATE STRATEGIC PLAN STATEMENT A: Approved for public release, distribution is unlimited (JANUARY 2017)

AUDITOR GENERAL S REPORT

Commission for Environmental Cooperation (CEC) Sponsored Workshop on Environmental Assistance Programs and Resources for Automotive OEMs and Suppliers

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

Turning Risk into Advantage

Data Governance Central to Data Management Success

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

VMware Cloud Operations Management Technology Consulting Services

How to get the Enterprise to Understand the Value of Security

Strategic Energy Institute Energy Policy Innovation Center EPICenter

2016 Summary Annual Report and Annual Meeting Documents

The Business Value of Metadata for Data Governance: The Challenge of Integrating Packaged Applications

Department of Justice Policing and Victim Services BUSINESS PLAN

Healthcare IT Modernization and the Adoption of Hybrid Cloud

The Defence Nuclear Enterprise: a landscape review

THE REGIONAL MUNICIPALITY OF YORK

Transcription:

NNSA Security Roadmap Strategic Initiatives for Managing the Defense Nuclear Security Program JEFFREY R. JOHNSON CHIEF, DEFENSE NUCLEAR SECURITY (NA-70) LEWIS E. MONROE III DIRECTOR, OFFICE OF SECURITY OPERATIONS AND PROGRAMMATIC PLANNING (NA-71)

The Simple Truth OVERVIEW Why Do We Need An NSR What Is The NSR Building The NSR Common Themes 4 Key Strategies What Makes the NSR is Different Implementation The Real Work and FUN!

THE SIMPLE TRUTH Because we are controlling the narrative! NSR is not all NA-71or DNS Not developed in response to GAO 5/14 report Cannot be implemented by the HQ staff It is not like any previous DNS strategic plans NSR is here for the long haul Development was the easy part

Great initiatives lacked real synergy Enterprise Mission Essential Task List (EMETL), Handgun Standardization, 10 CFR-1046 Fitness Standards Lacked ability to chart/track/measure progress of initiatives Difficult to sustain progress without a clear purpose WHY WE NEED AN NSR Real Transformation Follows a Path Steve Jobs Y-12 incursion ignited organizational transformation Enterprise deserved and needed a clear vision and path forward without it you perish Current state Future state How to get there

WHAT IS THE NSR NSR is a transformational blueprint developed with the intent of: Providing a vision, a strategy, and a path forward DNS program Defining the pace and trajectory (short-mid-long term) Driving continuous improvement of nuclear security program To make us fire preventers v. firefighters Addressing blind spots, flawed communications, misaligned roles Chronicling the transform effort for those who follow Foundational document not the end all just the beginning One security program executed in 8 locations

Where We Are BUILDING THE NSR Security Program Reviews NNSA 10 Rudman 99 Meserve 12 Shapiro 93 Baker/Hamilton 00 GAO 11 Hamre 02 Finan 12 GAO 03 Childs 04 Mies 05 DOE IG 05 GAO 07 Common Themes

COMMON THEMES Develop an approach to implementing initiatives that incorporates goals and implementation strategy. GAO Report-02-798, 2002 Revise NNSA Safeguards & Security Strategic Plan. Chiles Report, 2003 There comes a time when you just have to listen. Jay-Zee lacks a comprehensive strategic security plan that charts a course for the organization, strives to achieve better efficiency and effectiveness in security programs and provides a unifying vision. Mies Report, 2005 Build and execute an NNSA Security Road Map that consolidates recommendations, articulates a clear vision of where the security program is going. NNSA Security Task Force Report, 2012

4-KEY STRATEGY AREAS Allan Swanson Sandia Field Office Strive For Operational Excellence Drive an Effective, Efficient & Sustainable Field Security Program Lew Monroe DNS NA-71 Arnold Guevara NPO Field Office Modernize, Revitalize, and Recapitalize the Physical Infrastructure Develop and Sustain a Highly Capable Security Workforce Ray Phifer Nevada Field Office

STRATEGY #1 Strive for Operational Excellence One of the primary challenges confronting NNSA s nuclear security program is regaining its credibility and re-establishing the confidence of internal and external stakeholders. Implementing and executing the nuclear security program requires operational discipline and a commitment to excellence at all levels of the organization. Develop a comprehensive DNS communications strategy Revitalize the field performance assurance program Strengthen DOE and external stakeholder relationships

STRATEGY #2 Drive an Effective, Efficient and Sustainable Field Nuclear Security Program Without aggressive actions to assess, manage, and prioritize the many demands on the limited fiscal resources, the field nuclear security program will simply be unable to meet the expectations of stakeholders inside and outside of NNSA. In addition to addressing budget issues, Key Strategy 2 is designed to improve overall management of NNSA s nuclear security program. Develop and implement a DNS Program Integration Board Fully implement the Center for Security Technology, Analysis, Research, and Testing (CSTART) Provide effective management and oversight of operating budgets

STRATEGY #3 Modernize, Revitalize and Recapitalize the Physical Security Infrastructure NNSA s security systems and infrastructure for protecting critical assets are, in many cases, well beyond their life cycle, are in an unacceptable condition, and are technologically obsolete. Develop a Master Plan for Physical Security Systems and Infrastructure Management 10 Year Refresh Plan Mature development of the equipment standardization strategy

STRATEGY #4 Develop and Sustain a Highly Capable Security Workforce People are the single element that is most essential to the success of NNSA s security program. DNS s investment in the recruitment, retention, and training of security professionals is critical to attracting and retaining qualified personnel. A recurring finding across reviews was that NNSA security functions were not staffed effectively, and there was no strategic plan for human capital management. Leadership development Develop a career path for security professionals Pilot professional development exchanges with DoD and NRC

WHAT MAKES THE NSR DIFFERENT 2015-2020 NNSA Security Roadmap Strategic Initiatives for Managing the Defense Nuclear Security Program June 1, 2015 2015-2020 NNSA Security Roadmap Implementation Plan and Supporting Roles, Responsibilities, and Structure June 23, 2015 20 Pages 69 Pages Where We re Going The future nuclear security program will be flexible, efficient, innovative, and collaborative to meet the challenges of evolving national security threats. The future nuclear security program must ensure the following: Effective management Defined roles/responsibilities Effective performance assurance Strategic budgeting/resourcing Comprehensive implementation of corrective actions Accountability/Transparency

IMPLEMENTATION The goal of the Implementation Plan is to ensure that the efforts needed to implement the NSR key strategies are well documented, traceable, and that follow-through is included as an integral element in delivering the components of the each initiative. Assigns specific owners for each strategy, initiative, and action Requires milestones for all actions Requires weekly interface with NSR Lead/Coordinator/Owners Charter for each team working initiatives Quantifiable measurement of progress/effectiveness of actions

STRUCTURE

(5) BIG TAKEAWAYS Building one DNS program to be executed in 8 different locations The journey is transformational it s not the next bright and shiny We are driving standardization to achieve integration Goal is to achieve the most efficient and effective DNS program possible This is not your grandfather s Defense Nuclear Security Program

NNSA Security Roadmap Strategic Initiatives for Managing the Defense Nuclear Security Program JEFFREY R. JOHNSON CHIEF, DEFENSE NUCLEAR SECURITY (NA-70) LEWIS E. MONROE III DIRECTOR, OFFICE OF SECURITY OPERATIONS AND PROGRAMMATIC PLANNING (NA-71)