This Conference brought to you by

Size: px
Start display at page:

Download "This Conference brought to you by www.ttcus.com"

Transcription

1 This Conference brought to you by Linkedin/Group: Technology Training Technology Training Corporation

2 //FOUO ARSTAF Day at the Pre Command Course Army G 8 LTG James O. Barclay III Mr. Vince McCarron, Army G2 Big Data for Defense and Intelligence Symposium 03 December October 2015

3 Current Investments 1 DCGS-A 2 RITE Ubiquitous Access to Data Relevant Intelligence to Army s Access to IC, Joint ISR the Edge Integrated Foundry 3 Enhanced Force Sensors/Collectors 4 Intel Readiness 5 Structure Aerial, Terrestrial, Cyber Fully Leverage the Force No Cold Starts Data Transport Sensors Readiness No Cold Starts t No MI Soldier at Rest Force Structure DCGS A Hunte (Incr 1) Global Deployment Decision Build Out Army Global ISR Foundational Layer for RAF, AOC, COE DCGS A (Incr 2) RFP ICITE COE Command Post Computing Environment Harden & Resource Army s Expanding JWICs Network Info Assurance Accreditation User Monitoring Network Defense SCI Network Convergence RITE Rqts Into WIN T Ensure Access, Processing Power to Edge AISR Fleet Modernization GE Extended Range ARL, EMARSS, GEX Army Global PED Center CONOP, Mission Command Advance Improved Multi Functional Team Ground Platform Transition to Advanced SIGINT Sensors OSINT Across Force Expand Global HUMINT COE Sensor CE Compliance Foundry 2.0 In Base; Updating Program for RAF Increasing Live Ops at ECB RAF ISR Tng For Army GOs DCGS A on Networks Training Gray Eagle ISR CERTEX OSINT Certification of Force MICO/BCT S2 CERTEX Support to Targeting Intel Support to CEMA, Cyber Advanced SIGINT Upskilling Insider Threat Training 35 T Maint Tech Upskilling Data Scientists. Grow Out Now 2 More Theater Bdes 1 Aerial ISR Bde GE ER 3 Companies NGIC as Army ACE CI/HU Command 7x EMIBs 780 th MI Bde (Cyber) FOC Looking Forward Codify DPED Structure Codify GISA Structure Build OSINT Oversight Integrated with Mission Command //FOUO 3

4 Data Strategy Data Task: Track progress of design to requirements for intended mission environments and operational needs focusing on goals that support timely discovery, access, and use and concurrently support protection efforts to prevent compromise and mitigate t insider threat. id t Goals: 1. Support Multi-INT Integration 2. Improve Information Quality 3. Protect Information 4. Manage Access 5. Enable Leader Decisions //FOUO 4

5 Support Multi INT Integration Army Sensors & Data SIGINT HUMINT/CI GEOINT/FMV/UGS Biometric* GMTI CIED* STG* Prophet PRD 13 GRCS ARL MARSS* Green Dart* Wolfhound* DARBE* HIDRAH* Blackfin* LLVI Reporting Prophet CI Reporting IIR DIIR Civil Mil Ops* Patrol Debriefs* Key y Ldr Engagements* Village Rpt ing* Atmospherics* Constant Hawk* Highlighter* Desert Owl* Night Eagle* Saturn Arch* ARL MARSS* TACOP* Warrior Alpha* PGSS* Falcon Watch* Scorpion* OS II* WSS* UTAMS* PTDS* Copperhead* Puma* Raven Shadow Hunter Gray Eagle* LIDAR* Buckeye* CIB EO IR SAR GMTI VADAR* BAT* HIIDE* SEEK* NGIC Reporting* Watch List* BAT Dossier* COIC Reports CEXC Reports WIT Reports CIDNE Reports Exploit* CellEx Kits MEDEX Harmony TACDOMEX Data *Additions since CY2005 Others* Human Terrain Teams Provincial Reconstruction Teams Unit Reporting Transition Reports Reconstruction Culture Reports TTL Reporting Counter Intel Detainee Info National, Joint & Coalition Sensors & Data SIGINT HUMINT/CI IMINT/FMV/UGS Biometric* CIED* Exploit* NSA Products TACREPs KLs RTRG Alerts* DEA Information* Allied Information CIA Reports USMC Reports USAF Reports DIA Reports SOF Reports Coalition Reports* NATO Reports NGA CASi* USAF Unicorn* Predator Reaper U2 Global Hawk JSTARS LIDAR* EO IR SAR FMV DGS Reports SOF Reporting FBI ABIS USAF EYELID FBI TEDAC Coalition Reports JIEDDO/COIC JDEC Reporting NMED Reporting Navy Reporting Others* Law Enforcement Detainee Ops Threat Finance Tag, Track, Locate Continuously Changing to Satisfy Meet New Requirements and New Sensors/Data Sources by Leveraging Government, Industry, Allied and Academic Subject Matter Experts that Together, Create the Whole Intelligence Ecosystem //FOUO 5

6 Data Quality Data Visualization Data Warehousing Data Archiving Data Miningi Data Reuse Data Portability Data Repurposing Data Integrity Data Pedigree Data Elasticity Data Mobility Data Distribution Data Fusion Data Access Data Sharing Data Protection Data Dissemination Data Storage Data Variety Data Volume Data Velocity Data Veracity Data Exchange Data Breach Data Broker Data Dictionaryi Data Entry Data Governance Data Modeling Data Normalization Data Obfuscation Data Recovery Metadata Data De duplication Data Vl Value SmartData Data Discovery Data Tagging Structured Data Data Synchronization Data Integration Unstructured Data Data Consumption Data Ontology Semi Structured Data Data Modularity Data Exploitation ti Big Data I WANT YOU TO Data Extraction Data Transformation Data Correlation Data Taxonomy Data Collection Data Interoperability Data Spill Data Provenance Threat Data Unified Data Location Data Co MinglingData ENABLE ALL MISSION DATA NEEDS //FOUO 6

7 Data Protection OPERATIONAL IMPERATIVE Insider Threat WIKILEAKS Others Compromise OPM Breach Others Cost: $$$/Sources/Methods/Sharing Risk to the Army, Nation & Allies Assure our collectors, stewards and partners Risk management approach to data Threat counter measures & Mitigations Lifecycle management practices //FOUO 7

8 Enable Leadership Decisions Florence Nightingale, British Civilian Showed Disease versus Battle Charles Minard, French Civilian Showed Napoleon March to/from Moscow Multi INT Correlated Spatial Temporal Situational Force Effects Based Awareness Protection Targeting //FOUO 8

9 AMERICA S ARMY: Task Force Smith JULY 5, KIA, WIA, POW JULY 6, Men 378 Men 24 Hours 24 Hours When Americas Army Is Not Ready //FOUO 9

10 Questions / Globally Engaged Regionally Aligned Enabling Decisive Operations //FOUO 10

Army Intelligence Industry Day Foundation Layer Technology Focus Areas

Army Intelligence Industry Day Foundation Layer Technology Focus Areas CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,

More information

US Army Intelligence and Security Command (INSCOM)

US Army Intelligence and Security Command (INSCOM) US Army Intelligence and Security Command (INSCOM) Overview Briefing for National Defense Industrial Association (NDIA) Presented by Brigadier General Robert L. Walter Jr. INSCOM Deputy Commanding General

More information

This Conference brought to you by www.ttcus.com

This Conference brought to you by www.ttcus.com This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com U.S. Army Intelligence and Security Command Army

More information

Click to edit Master title style

Click to edit Master title style Click to edit Master title style UNCLASSIFIED//FOR OFFICIAL USE ONLY Dr. Russell D. Richardson, G2/INSCOM Science Advisor UNCLASSIFIED//FOR OFFICIAL USE ONLY 1 UNCLASSIFIED Semantic Enrichment of the Data

More information

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs

More information

Information and Understanding (IFU) Overview

Information and Understanding (IFU) Overview Information and Understanding (IFU) Overview Jun 8 th, 2010 Mark Pronobis IFU CTC Lead AFRL/RIEF mark.pronobis@rl.af.mil Approved for Public Release; Distribution Unlimited: 88ABW-2010-2619 dated 13 May

More information

The State of DoD Biometrics

The State of DoD Biometrics The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E thomas.dee@osd.mil 1 Agenda What We ve Done Biometrics

More information

Forecast to Industry 2015

Forecast to Industry 2015 Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:

More information

Enterprise Capabilities Descriptions

Enterprise Capabilities Descriptions 1 SYSTEMS ENGINEERING & INTEGRATION 6 COMMUNICATIONS SYSTEMS 11 LIFECYCLE SYSTEMS ENGINEERING 12 LIFECYCLE SYSTEMS INTEGRATION 13 MISSION INTEGRATION 14 DISCIPLINES 15 DOMAINS 2 CYBER 21 CYBER STRATEGIC

More information

The Next Gen ISR Conference brought to you by: www.ttcus.com

The Next Gen ISR Conference brought to you by: www.ttcus.com The Next Gen ISR Conference brought to you by: www.ttcus.com @Techtrain Linkedin/Groups: Technology Training Corporation BOOZ ALLEN HAMILTON DCGS Enhanced ISR: PED for Actionable Intelligence WAZE is an

More information

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015 AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3115.10E March 24, 2006 USD(I) SUBJECT: Intelligence Support to Personnel Recovery References: (a) Title 10, United States Code (b) Title 50, United States Code

More information

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT) Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction

More information

Cyber Domain and LandWarNet: Powering the Army AUSA 2012

Cyber Domain and LandWarNet: Powering the Army AUSA 2012 Cyber Domain and LandWarNet: Powering the Army AUSA 2012 Lead: LTG Rhett A. Hernandez, Commanding General, United States Army Cyberspace Command LTG Donald M. Campbell, Jr., Commanding General, III Corps

More information

Cyber Situational Awareness - Big Data Solution

Cyber Situational Awareness - Big Data Solution Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and

More information

Toward the Goal of Continuous Track and Identity

Toward the Goal of Continuous Track and Identity Toward the Goal of Continuous Track and Identity Donald F. Herrick herrick@alphatech.com (781) 273-3388 x286 Collaborative Signal Processing Workshop January 14-16, 2001 Xerox PARC Palo Alto, CA Outline

More information

Reliable, Repeatable, Measurable, Affordable

Reliable, Repeatable, Measurable, Affordable Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you

More information

How To Build A Cloud Based Intelligence System

How To Build A Cloud Based Intelligence System Semantic Technology and Cloud Computing Applied to Tactical Intelligence Domain Steve Hamby Chief Technology Officer Orbis Technologies, Inc. shamby@orbistechnologies.com 678.346.6386 1 Abstract The tactical

More information

Alaska Elevation Data Collection Update National Geospatial Advisory Committee

Alaska Elevation Data Collection Update National Geospatial Advisory Committee Alaska Elevation Data Collection Update National Geospatial Advisory Committee 22 June 2010 Steve Wallach NGA GEOINT Information Executive 1 2 3 AK Elevation Data - Contract Status Contributing partners

More information

Imagine a global data collection network that gathered information on. everyone doing anything

Imagine a global data collection network that gathered information on. everyone doing anything Imagine a global data collection network that gathered information on everyone doing anything Fusion Centers or I Spy for the Intelligence Enterprise Copyright OK-SAFE, Inc. August 2010 Freedom Action

More information

ACSAC 2007 - CWID 2007 Data Diode Case Study. http://www.owlcti.com toll free 866.695.3387

ACSAC 2007 - CWID 2007 Data Diode Case Study. http://www.owlcti.com toll free 866.695.3387 ACSAC 2007 - CWID 2007 Data Diode Case Study http://www.owlcti.com toll free 866.695.3387 Coalition Warrior Interoperability Demonstration (CWID) 2007 Case Studies in Data Diode Application http://www.owlcti.com

More information

Providing On-Demand Situational Awareness

Providing On-Demand Situational Awareness ITT Exelis Geospatial Intelligence Solutions Providing On-Demand Situational Awareness Use of U.S. Department of Defense (DoD) and U.S. Army imagery in this brochure does not constitute or imply DoD or

More information

Operation IMPACT (Injured Military Pursuing Assisted Career Transition)

Operation IMPACT (Injured Military Pursuing Assisted Career Transition) Operation IMPACT (Injured Military Pursuing Assisted Career Transition) January 2013 Operation IMPACT Program Management Office Northrop Grumman Today Leading global security company providing innovative

More information

UNCLASS FORT GORDON GEORGIA CYBER REQUIREMENTS. MAJ Hurcules Murray TCM- CYBER DCO Chief 1 UNCLASS

UNCLASS FORT GORDON GEORGIA CYBER REQUIREMENTS. MAJ Hurcules Murray TCM- CYBER DCO Chief 1 UNCLASS CYBER REQUIREMENTS MAJ Hurcules Murray TCM- CYBER DCO Chief 1 Purpose Purpose: A broad overview of the current and emergent Army cyberspace requirements identified through capability based assessments,

More information

UNCLASSIFIED. Army Data Governance. COL Linda Jantzen CIO/G-6 Acting Dir, Army Architecture Integration Center February 17, 2016 UNCLASSIFIED

UNCLASSIFIED. Army Data Governance. COL Linda Jantzen CIO/G-6 Acting Dir, Army Architecture Integration Center February 17, 2016 UNCLASSIFIED Army Data Governance COL Linda Jantzen CIO/G-6 Acting Dir, Army Architecture Integration Center February 17, 2016 Agenda Current Environment Data Governance Army Data Strategy Standards and Compliance

More information

DoD Strategy for Defending Networks, Systems, and Data

DoD Strategy for Defending Networks, Systems, and Data DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July

More information

This Symposium brought to you by www.ttcus.com

This Symposium brought to you by www.ttcus.com This Symposium brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com Big Data Analytics as a Service (BDAaaS) Big Data

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.21 March 18, 2008 DA&M SUBJECT: Defense Intelligence Agency (DIA) References: (a) Title 10, United States Code (b) Title 50, United States Code (c) Executive

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation

More information

Espionage and Intelligence. Debra A. Miller, Book Editor

Espionage and Intelligence. Debra A. Miller, Book Editor Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system

More information

Industry White Board Session

Industry White Board Session Industry White Board Session SYNOPSIS AFCEA White Board Lunch SYNOPSIS On Jan. 14, 2015, the U.S. Army Program Executive Office Command, Control and Communications - Tactical (PEO C3T), partnered with

More information

Mission-Critical Database with Real-Time Search for Big Data

Mission-Critical Database with Real-Time Search for Big Data Mission-Critical Database with Real-Time Search for Big Data February 17, 2012 Slide 1 Overview About MarkLogic Why MarkLogic Case Studies Technology and Features Slide 2 About MarkLogic 10 years in business

More information

PEO IEW&S AFCEA Briefing

PEO IEW&S AFCEA Briefing PEO IEW&S AFCEA Briefing NOVEMBER 2015 Mr. Stephen Kreider PEO IEW&S PEO IEW&S AFCEA Briefing NOVEMBER 2015 Unclassified 1 MISSION: Provide affordable, world class Sensor and Electronic Warfare capabilities

More information

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise 5 APR 2011 1 2005... Advanced Analytics Harnessing Data for the Warfighter I2E GIG Brigade Combat Team Data Silos DCGS LandWarNet

More information

Combating Spear-phishing:

Combating Spear-phishing: Combating Spear-phishing: Convergence of Intel, Ops, Forensics, and Vulnerability Management Mr. Billy Rodriguez, GCIH Chief Intrusion Prevention Section Mr. Jacob Stauffer, GCFA, GREM Chief Intrusion

More information

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1

US Intelligence Community. 2005-6 Thomas Patrick Carroll 1 US Intelligence Community 2005-6 Thomas Patrick Carroll 1 Policy (defn): (a) General course of action, selected from among alternatives, intended to guide present and future decisions. (b) A highlevel

More information

Director of Intelligence Proposed Research Topics

Director of Intelligence Proposed Research Topics Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC 20350-3000 Sept 2011 DIRINT Suggested Graduate Program Thesis

More information

Big Data for Government Symposium

Big Data for Government Symposium @TECHTrain Big Data for Government Symposium http://www.ttcus.com Linkedin/Groups: Technology Training Corporation DHS BIG DATA CAPABILITIES WHAT TO USE Focus is on meeting Mission Decision Needs Gathering

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use Enhancing Safeguards Through Information Analysis: Business Analytics Tools IAEA, Vienna, 09/10/2014 Julian Midwinter - Business Unit Executive i2, Threat and Counter Fraud General Use 2014 IBM Corporation

More information

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security. Written Testimony of Dr. Andy Ozment Assistant Secretary for Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee on Oversight and Government

More information

Accenture Cyber Security Transformation. October 2015

Accenture Cyber Security Transformation. October 2015 Accenture Cyber Security Transformation October 2015 Today s Presenter Antti Ropponen, Nordic Cyber Defense Domain Lead Accenture Nordics Antti is a leading consultant in Accenture's security consulting

More information

Systems Engineering and Integration Efforts. 11 Dec 2013

Systems Engineering and Integration Efforts. 11 Dec 2013 Systems Engineering and Integration Efforts 11 Dec 2013 Mr. Leo Smith Director, PoR Engineering Support ASA(ALT) System of Systems Engineering & Integration Directorate (SOSE&I) Approved for Public Release;

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3115.12 August 24, 2010 USD(I) SUBJECT: Open Source Intelligence (OSINT) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes policy, assigns

More information

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012 (U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)

More information

Bridging the Digital Divide with Net-Centric Tactical Services

Bridging the Digital Divide with Net-Centric Tactical Services Bridging the Digital Divide with Net-Centric Tactical Services Authors: Scott D. Crane, Charles Campbell, Laura Scannell Affiliation: Booz Allen Hamilton E-mail: crane_scott@bah.com 1. Abstract The DoD

More information

Improvised Explosive Device Network Analysis

Improvised Explosive Device Network Analysis Improvised Explosive Device Network Analysis IED NA utilizes network analysis methods to fill gaps in the understanding and visualization of IED networks Typical network analysis of illicit networks focuses

More information

Threat Intelligence: Friend of the Enterprise

Threat Intelligence: Friend of the Enterprise SECURELY ENABLING BUSINESS Threat Intelligence: Friend of the Enterprise Danny Pickens Principal Intelligence Analyst MSS FishNet Security DANNY PICKENS Principal Intelligence Analyst, FishNet Security

More information

Update On Smart Grid Cyber Security

Update On Smart Grid Cyber Security Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats

More information

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security 1 NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations Ian J West Chief, Cyber Security Ian.west@ncia.nato.int 2 NATO UNCLASSIFIED Cyber Security Service Line Ian West

More information

Space and Naval Warfare Systems Center Atlantic

Space and Naval Warfare Systems Center Atlantic Space and Naval Warfare Systems Center Atlantic Small Business and Industry Outreach Initiative (SBIOI) Twenty-Seventh Quarterly Symposium 31 January 2013 Mr. Charles Adams Transport & Computing Infrastructure

More information

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST

More information

Evolution Of Cyber Threats & Defense Approaches

Evolution Of Cyber Threats & Defense Approaches Evolution Of Cyber Threats & Defense Approaches Antony Abraham IT Architect, Information Security, State Farm Kevin McIntyre Tech Lead, Information Security, State Farm Agenda About State Farm Evolution

More information

Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003

Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003 Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise (GES) Mr. Rob Walker 24 September 2003 Common Operating Environment COE is mission-application independent - A basis for

More information

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,

More information

Simulation and Training Solutions

Simulation and Training Solutions Simulation and Training Solutions Strong Learning Experiences Available Nowhere Else Advancing Operational Readiness with Leading-Edge Simulation and Training The rapid evolution of military missions,

More information

The 5 Most Influential Data Visualizations of All Time

The 5 Most Influential Data Visualizations of All Time The 5 Most Influential Data Visualizations of All Time About these visualizations Data visualization allows us all to see and understand our data more deeply. That understanding breeds good decisions.

More information

Corporate Overview A

Corporate Overview A Corporate Overview A WHO WE ARE ManTech International Corporation uses advanced technology to help government and industry meet some of their greatest challenges and succeed in their most important endeavors.

More information

TechNet Land Forces South Small Business Opportunities. Carey Webster Director, Federal Information Solutions Deltek

TechNet Land Forces South Small Business Opportunities. Carey Webster Director, Federal Information Solutions Deltek TechNet Land Forces South Small Business Opportunities Carey Webster Director, Federal Information Solutions Deltek Agenda Review of Upcoming Opportunities for Small Businesses Army 8 Small Business Navy

More information

Fight the Network. Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches kevinj@netwerxinc.com. Briefing name l Date (1)

Fight the Network. Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches kevinj@netwerxinc.com. Briefing name l Date (1) Fight the Network Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches kevinj@netwerxinc.com Briefing name l Date (1) Problem Army Strategy for Net-Centric Fighting Force

More information

Enterprise Services to the Edge

Enterprise Services to the Edge Enterprise Services to the Edge Mr. Jeremy Hiers Project Director, PD ES 22 May 2013 UNCLASSIFIED P D E S O V E R V I E W 1 UNCLASSIFIED Agenda UNCLASSIFIED Who is PD Enterprise Services? Concept for Enterprise

More information

Trusted Experience on Major Data Center Initiatives

Trusted Experience on Major Data Center Initiatives Trusted Experience on Major Data Center Initiatives Modernizing and Building A New Generation of Data Centers Experience is the first thing you want in a data center provider. General Dynamics Information

More information

Counterintelligence Awareness Glossary

Counterintelligence Awareness Glossary Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity

More information

AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration

AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration Headquarters Air Combat Command AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration This Briefing is: UNCLASSIFIED Mr. John Vona, GS-15 AFC2IC/C2P Purpose Discuss

More information

ENABLING A RESPONSIVE AND AGILE INTELLIGENCE ENTERPRISE

ENABLING A RESPONSIVE AND AGILE INTELLIGENCE ENTERPRISE ENABLING A RESPONSIVE AND AGILE INTELLIGENCE ENTERPRISE A White Paper prepared by the AFCEA Intelligence Committee April 2008 Serving Intelligence Professionals and their Community SpringIntel08_WhitePaperCover

More information

SatCom For Net-Centric Warfare July/August 2011. MilsatMagazine

SatCom For Net-Centric Warfare July/August 2011. MilsatMagazine SatCom For Net-Centric Warfare July/August 2011 MilsatMagazine Emergency Communications C-COM, Hughes Boeing GPS II-F IvySys Technologies Command Center Guardian Mobility idirect Government Technologies

More information

Zoonotic Disease Symposium US Army Veterinary Service

Zoonotic Disease Symposium US Army Veterinary Service Zoonotic Disease Symposium US Army Veterinary Service COL Bob E. Walters Director, Department of Defense Veterinary Service Activity 24 September 2010 US Army Veterinary Service FORCE PROTECTION F O O

More information

Forecast to Industry 2015 External Contracting Opportunities

Forecast to Industry 2015 External Contracting Opportunities Forecast to Industry 2015 External Contracting Opportunities Mr. Douglas W. Packard Director, Procurement Services Directorate 2 November 2015 UNCLASSIFIED 109 103 ENCORE III Navy Maintenance Database

More information

Insider s Guide to Careers in Intelligence Analysis. hosted by Tom Hunter, MA, M.Litt. (Former DIA Senior Intelligence Analyst)

Insider s Guide to Careers in Intelligence Analysis. hosted by Tom Hunter, MA, M.Litt. (Former DIA Senior Intelligence Analyst) Insider s Guide to Careers in Intelligence Analysis hosted by Tom Hunter, MA, M.Litt. (Former DIA Senior Intelligence Analyst) December 17, 2009 Overview Presenter s Background Overview of Intelligence

More information

Meeting Cyber Security Challenges

Meeting Cyber Security Challenges Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber

More information

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute

More information

Exploiting Data at Rest and Data in Motion with a Big Data Platform

Exploiting Data at Rest and Data in Motion with a Big Data Platform Exploiting Data at Rest and Data in Motion with a Big Data Platform Sarah Brader, sarah_brader@uk.ibm.com What is Big Data? Where does it come from? 12+ TBs of tweet data every day 30 billion RFID tags

More information

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente Gaining and Maintaining Support for a SOC Jim Goddard Executive Director, Kaiser Permanente Objectives Agenda 1 Lessons learned 2 How to build interest 3 Producing tangible benefits 4 Building momentum

More information

Information Dominance as a Warfighting Discipline

Information Dominance as a Warfighting Discipline Information Dominance as a Warfighting Discipline Assured C2 Network the Force Command Forces Coordinate Fires Assess Fires and Force Status Battlespace Awareness Know the Enemy and the Environment Fuse

More information

A Comprehensive Cyber Compliance Model for Tactical Systems

A Comprehensive Cyber Compliance Model for Tactical Systems A Comprehensive Cyber Compliance Model for Tactical Systems Author Mark S. Edwards, CISSP/MSEE/MCSE Table of Contents July 28, 2015 Meeting Army cyber security goals with an IA advocate that supports tactical

More information

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING BACKGROUNDER Point of Contact: Mr. James L. Lindsey (703) 704-0194 James.L.Lindsey8.civ@mail.mil PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING Product Director, Enterprise Content,

More information

Some Thoughts on the Future of Cyber-security

Some Thoughts on the Future of Cyber-security Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions

More information

Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career

Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career Chad Storlie Author, Iraq Combat Veteran, Business Leader www.combattocorporate.com

More information

JFACC Information Management (IM) Capability 2010

JFACC Information Management (IM) Capability 2010 MP 04W0000052 MITRE PRODUCT JFACC Information Management (IM) Capability 2010 Functional Decomposition of Operational Activities Version 1.0 December 2004 J. Vittori J. S. Cook Sponsor: AFC2ISRC/CX Contract

More information

DISA Testing Services for the Enterprise. Luanne Overstreet

DISA Testing Services for the Enterprise. Luanne Overstreet DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3305.15 August 13, 2015 USD(I) SUBJECT: DoD Human Intelligence (HUMINT) Training and Certification References: See Enclosure 1 1. PURPOSE. In accordance with the

More information

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The

More information

How To Protect Your It Infrastructure

How To Protect Your It Infrastructure Proactive Real-Time Monitoring and Risk Management Managed Security Services NCS Group Offices Australia Bahrain Brunei China Dubai Hong Kong SAR Korea Malaysia Philippines Singapore Sri Lanka Understanding

More information

How to avoid building a data swamp

How to avoid building a data swamp How to avoid building a data swamp Case studies in Hadoop data management and governance Mark Donsky, Product Management, Cloudera Naren Korenu, Engineering, Cloudera 1 Abstract DELETE How can you make

More information

Health Care Solutions

Health Care Solutions Health Care Solutions Increase Service Levels, Meet Expectations A Unified Approach to Health Care Automation Processes Hospitals, clinics, extended care facilities, and physician s offices are facing

More information

Flexible, Life-Cycle Support for Unique Mission Requirements

Flexible, Life-Cycle Support for Unique Mission Requirements Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics

More information

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES. Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive

More information

RC & CREATING DATA PRIVACY OPPORTUNITIES USING BIG IN EUROPE DATA AND ANALYTICS. risk compliance RISK & COMPLIANCE MAGAZINE.

RC & CREATING DATA PRIVACY OPPORTUNITIES USING BIG IN EUROPE DATA AND ANALYTICS. risk compliance RISK & COMPLIANCE MAGAZINE. JAN-MAR 2014 R E P R I N T RC & risk compliance & CREATING DATA PRIVACY OPPORTUNITIES USING BIG IN EUROPE DATA AND ANALYTICS REPRINTED FROM: RISK & COMPLIANCE MAGAZINE JAN-MAR 2015 2014 ISSUE RC & risk

More information

A New Security Dimension: Industry Experience Using Open Standards to Accelerate Threat Response

A New Security Dimension: Industry Experience Using Open Standards to Accelerate Threat Response A New Security Dimension: Industry Experience Using Open Standards to Accelerate Threat Response Jason Corbin VP Product Management and Strategy IBM Security Cyber Threat Intelligence Refresher Payload

More information

Leveraging Network Infrastructure to Bring Critical Information to Users

Leveraging Network Infrastructure to Bring Critical Information to Users Leveraging Network Infrastructure to Bring Critical Information to Users 13 May 2013 Brian Slaughter Director, Global Public Safety Sales General Dynamics C4 Systems 2013 General Dynamics. All rights reserved.

More information

CORPORATE CAPABILITIES. DOD RDT&E Services Enterprise Architecture & Portfolio Management Training & Logistics

CORPORATE CAPABILITIES. DOD RDT&E Services Enterprise Architecture & Portfolio Management Training & Logistics CORPORATE CAPABILITIES DOD RDT&E Services Enterprise Architecture & Portfolio Management Training & Logistics Droidan is a Certified 8(a), Minority, Veteran-Owned Small Business providing professional

More information

Cloud Computing Strategy

Cloud Computing Strategy Department of Defense Chief Information Officer Cloud Computing Strategy July 2012 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is

More information

ARSOF Conventional Army Integration: An Army perspective on integration and synergies in the current and future environment

ARSOF Conventional Army Integration: An Army perspective on integration and synergies in the current and future environment ARSOF Conventional Army Integration: An Army perspective on integration and synergies in the current and future environment -LTG John F. Mulholland Commanding General, United States Army Special Operations

More information

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 CALL FOR PAPERS for the IST/SET-126 Symposium on Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 to be held in Norfolk Virginia,

More information

Gaps in Automated Situational Awareness

Gaps in Automated Situational Awareness Defense Information s Agency Gaps in Automated Situational Awareness Mr Joe Wolfkiel DISA PEO MA IA5 November 1, 2011 Overview Technical Gaps Conceptual Gaps Policy Gaps 2 Manual Data Collection Tools

More information

Balancing Privacy & Security: The Role of Privacy and Civil Liberties in the Information Sharing Environment

Balancing Privacy & Security: The Role of Privacy and Civil Liberties in the Information Sharing Environment Balancing Privacy & Security: The Role of Privacy and Civil Liberties in the Information Sharing Environment IAPP Conference 2010 Samuel P. Jenkins Director for Privacy, Defense Privacy & Civil Liberties

More information

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Eight Essential Elements for Effective Threat Intelligence Management May 2015 INTRODUCTION The most disruptive change to the IT security industry was ignited February 18, 2013 when a breach response company published the first research that pinned responsibility for Advanced Persistent

More information

Architecture. Governance

Architecture. Governance Capabilities Integration Enterprise Forum Architecture Standards d and Governance UTILIZING DATA STEWARDSHIP TO MANAGE ARCHITECTURE DATA FOUO TRADOC: Victory Starts Here! Army s Net centric Goals Army

More information