UNCLASS FORT GORDON GEORGIA CYBER REQUIREMENTS. MAJ Hurcules Murray TCM- CYBER DCO Chief 1 UNCLASS

Size: px
Start display at page:

Download "UNCLASS FORT GORDON GEORGIA CYBER REQUIREMENTS. MAJ Hurcules Murray TCM- CYBER DCO Chief 1 UNCLASS"

Transcription

1 CYBER REQUIREMENTS MAJ Hurcules Murray TCM- CYBER DCO Chief 1

2 Purpose Purpose: A broad overview of the current and emergent Army cyberspace requirements identified through capability based assessments, with a synopsis of all the work coming from the cyber capabilities based analysis. 2

3 Agenda TOPICS: Army Required & Current Capabilities IS D: DCO / OCO / Cyber Situational Awareness Prioritized Gaps Cyber CBA Conclusions Recommended Solution Sets 3

4 Army Cyber Required Capabilities Required Capabilities: Each echelon requires the ability to access capabilities resident at other echelons Task + Condition + Standard (metrics) Conduct: to direct or take part in the operation or management of (administer, control, direct, lead, operate, order, organize). Perform: to carry out an action or pattern of behavior complete, move, observe, operate, react Deliver: to send to an intended target or destination Company Company includes: Platoon, Squad, Fire team, Soldier Battalion CEM Bde/BCT CEM Division Corps Defend in Depth; Ability to protect individuals and platforms. ASCC Conduct CEMA; Perform DODIN operations, EW and EMSO; Deliver EA. Build, Operate and Defend a network that ensures Mission Command Commanders SA, includes social media/layer (Cyber CBA #1 Capability Gap) CEM ARCYBER JFHQ ACOIC Conduct CEMA. Perform/Deliver DODIN operations, DCO,OCO, Hunt, Support to tactical forces. Conduct CEMA; Perform/Deliver DODIN operations, DCO, OCO, EW & EMSO. Support to tactical forces. Conduct CEMA; Perform/Deliver DODIN operations, DCO, OCO, EW & EMSO. Support to tactical forces. Extend cyber Conduct CEMA; Perform DODIN operations, DCO, EW & SMO; Deliver EA; to Operational Integrate OCO. and Tactical Commanders CEM CCMD CSE CEM USCC TEAM S 4

5 Army Current Capabilities Limited cyber doctrine, training and leader development Policy and authorities do not support tactical commanders. GENFOR limited ability to provide cyber & EW capabilities to operational forces limited velocity & capacity Legacy, non-standard networks, undefendable, expensive. Limited self-protection, understanding of Limited offensive capabilities CEM Staff element limited capacity and training Partial tactical expertise Battalion and Below includes: Company Platoon Squad Fire team Soldier 5 Battalion and Below CoIST DCGS-A Self protect jammers (CREW, CVRJ, MMBJ) 25 Series 29 Series 35Series S2 S3 S6 MC/NetOps (CPOF, FBCB2, NIPR, SIPR) S2 S3 S6 25 Series 29 Series 35Series Bde/BCT TROJAN DCGS-A MI CO SBCT SURV TRP MC/NetOps (CPOF, FBCB2, NIPR, SIPR, JWICS) Prophet UAS Plt Self protect jammers (CREW, CVRJ, MMBJ) G2 / ACE G3 G6 Fires 25 Series Division/Corps 29 Series 35Series MI BN BFSB Expeditionary Signal BN DCGS-A MC/NetOps (GNEC) Aircraft Survivability Equipment Prophet TROJAN CAB NOSC Joint & National G2 / ACE G3 G6 Fires MI BDE Theater Signal Command Theater Tactical Sig Bde TNOSC ASCC JSTARS TROJAN DCGS-A (FIXED) MC/NetOps (GNEC) Aircraft Survivability Equipment 25 Series 29 Series 35Series Army Cyber Command Space Systems NTM Multi-Intel Sensors/ Platforms DCGS-A 25 Series 35Series NETCOM INSCOM 1 st IO (Cyber Elements) Cyber Bde 5

6 Army Prioritized Cyber Gaps 6 Cyber CBA FNA Gap Overall Priority Cyber Gap 17: Commanders SA (Includes social media/layer) 01 Cyber Gap 07: Defend in Depth 02 Cyber Gap 13: DCyD, Hunt and DCO-RA 03 Cyber Gap 05: Operate Networks 04 Cyber Gap 15: Collect, Process and Analyze Adversary Information 05 Cyber Gap 24: RDT&E, RDA and Technical Architecture 06 Cyber Gap 11: Offensive Architecture and Infrastructure 07 Cyber Gap 16: Cyber Attack/OCO 08 Cyber Gap 12: Access to Adversaries 09 Cyber Gap 03: Establish the Enterprise 10 Cyber Gap 14: Exploit Cyber and EW Capabilities 11 Cyber Gap 31: Electronic Protection 12 Cyber Gap 26: Security and Vul Assessments 13 Cyber Gap 32: Electronic Warfare Support 14 Cyber Gap 01 Cyber (Cyber/Electromagnetic) Integration 15 Cyber Gap 30: Conduct Electronic Attack 16 Cyber Gap 27: SE and Forensics 17 Cyber Gap 22: Integrate WfFs and Assess (BDA) 18 Cyber Gap 25: Legal and Policy Oversight 19 Cyber Gap 08: Information, Services and Applications 20 Cyber Gap 04: Access and Authentication 21 Cyber Gap 06: Integrate Mission Partners 22 Cyber Gap 29: Homeland Defense/DSCA 23 Cyber Gap 09: Unity of Command/Governance 24 Mission critical, we must do! Mission essential to take the initiative! Sustain the operational initiative! Commanders SA and understanding the social dimension of cyberspace are critical to Joint and Unified Land Operations Many of the gaps cross multiple required capabilities DOTmLPF actions such as Doctrine and LDE&T can mitigate large portions of these gaps. Materiel development is REQUIRED. An Army Cyber Roadmap could provide synergy of these areas (RDT&E, RDA, S&T) Cell Color Indicates Level of Risk: Extremely High Risk High Risk Moderate Risk Low Risk 6

7 7 Commanders SA and the COP See Yourself, the Threat & the Cyberspace Terrain Understand Operational Impact, Risk and Mitigation Cyber and the EMS in Unified Land Operations Network as an Operational Platform Single, Secure Network, Must defend to operate Full spectrum Cyberspace and EW Operations Ensure Mission Command Commanders require freedom to maneuver Must have tactical offensive cyber & EW capabilities If not, Army cedes the initiative to the adversary Integrated Cyber Planning and Execution Cyber/EW Effects tied to Commander s Objectives Synchronize Lethal & Non-Lethal Robust CEMA element tied to CNMTs (Joint teams) Transform the Army, Trained and Ready Forces Fundamental Principles Doctrine, Education, Training, and Leader Development is Key 7

8 Commanders and Units Commanders must understand: Staffs: How the cyber domain and EMS influences and impacts their operational environment How to fully leverage cyber and EW capabilities holistically in Unified Land Operations Integrate Cyber and EW in maneuver How to call for support, reach-back capabilities Cyber/EW Units: Ability to create the operational cyber conditions throughout their area of operations Capacity to adeptly apply multiple capabilities, responsively, simultaneously Synchronization and collaboration among all mission elements, joint and Army Timely, responsive, continuous support for offensive cyber and EW. Can be done within today's authorities, extends the joint Title-X platform (USCC/ARCC) to the tactical level. Units simultaneously act across the physical domains, cyberspace, and the electromagnetic spectrum x 8 8

9 DCO IS D Description: The Defensive Cyberspace Operations capability is an integrated solution that provides protection against, monitoring/detection/analysis of, and response to known/unknown network and information system threats and vulnerabilities to achieve freedom of action in the cyberspace domain in support of unified land operations. The approval of the DCO IS D is a critical step towards establishing a true defense-in-depth across a friendly, neutral, and adversary portions of the Cyberspace domain. Gaps: 07 Defend in Depth 11 Offensive Architecture and Infrastructure 12 Access to Adversaries 13 DCyD, Hunt, and DCO-RA 16 Cyber Attack/OCO 22 Integrate WfFs and Assess Battle Damage 26 Security and Vulnerability Assessments 27 SE and Forensics 29 Homeland Defense/DCSA Protect JIE NEMC I Detect DCO GIG IA Response LWN Assess Capabilities: 9 P P P Gaining/Maintaining SA Discovery, Detecting, Analyzing, Mitigating Responding Outmaneuvering Actively Hunting Dynamically Re-establishing, Re-securing, Re-routing, Reconstituting, and Isolating DCO-RA Protecting Networks, Platforms, and Data Transferring Data Securely Managing User Identities Protecting Key/Critical Cyber Terrain/Infrastructure In-depth Assessments Site Exploitation/Forensics P

10 Offensive Cyber Operations IS I Description: The Offensive Cyberspace Operations (OCO) Information System Initial Capability Document (IS I) will establish the framework for the rapid identification, validation, development and fielding of capabilities required to execute OCO by ARCYBER operational forces in support of Service and Joint operations and requirements. The OCO IS I will align existing programs, emergent technologies, and resources to form an all-inclusive offensive cyber capabilities portfolio. This will enable the transition or acquisition of people, processes and technologies into a development methodology consistent with the Joint Capability Integration and Development System (JCIDS) and the Defense Acquisition System, promoting unity of effort throughout the community. Gaps: Offensive Architecture and Infrastructure Collect, Process and Analyze adversary information Cyber Attack/OCO Access to adversaries Exploit Cyber and EW capabilities DCyD, Hunt and DCO-RA Capabilities: An Army offensive infrastructure A common offensive firing platform Gaining and maintaining situational awareness Offensive Capabilities against tactical military communications Offensive Capabilities against critical ground force support infrastructure Offensive Capabilities against ground force systems OCO IS I OCO Infrastructure OCO Firing Platform Situation Awareness Tactical Military Communications Critical Ground Force Support Infrastructure Ground Force Systems 10

11 Cyber SA D Description: Situational Awareness (SA) ranges from understanding how tactical level actions within the cyber domain can have strategic implications within DoD, public, and private sector cyberspace to shared scalable awareness of joint, coalition, and interagency, operational status and intent. Cyber SA provides the Army and Joint Forces commanders an understanding of cyberspace infrastructure, its use by adversaries and neutral users, and impact on decisive operations. Gaps: 17 Commander s SA 05 Operate Networks 15 Collect Process and Analyze adversary Information 11 Offensive Architecture and Infrastructure 14 Exploit Cyber and EW Capabilities 31 Electronic Protection 26 Security and Vulnerability Assessments 32 Electronic warfare Support 01 Cyber (Cyber Electromagnetic SA is required) Integration 22 Integrate Warfighting Functions (WfF) and Assess BDA 23 Integrate Mission Partners Capabilities: Corps SA of the cyberspace domain and EMS; blue, white, grey, and red Internet Topography Targeting in cyber (includes EMS) and as part of land operations Connection to National Capacities (IC, National and Service Labs, AMC) Division SA/Identification Friend or Foe capability; blue, white, grey and red; internet topography Targeting in cyber (includes EMS) and as part of land operations CEM deconfliction with Organic and non-organic Elements and BCT and BCT and Below (ATO, Cyber, IC) May be restricted to TS level (limited STO) Visualization of task/org elements from BDE and Below to echelons above ASCC Brigade SA/Identification Friend or Foe capability; blue, white, grey and red; graphic representation (dash board) Highly Defined Targeting-e.g. route clearance support, mapped key terrain (cyber to geo and/or mission impact) Provide Real-Time/Near Real Time data; BW limits, EMS Considerations; MC System Capable; Tied to Physical 11 Topography

12 Solution Sets FSA identified 45 solutions to mitigate 24 FNA gaps Solutions were aligned to the gaps in the RSA worksheet focusing on the Technical Risk, Supportability, Feasibility, Affordability, and DOTMLPF-P implications Solutions were then prioritized by the overall gap priority and by the number of gaps the solution addressed Interdependent solutions were grouped together Based on the above, solutions were grouped into first, second and third priority groups. Within each priority are interdependent solutions that support each other and need to be implemented on a similar timeline (supporting and related solutions)

13 Priority Solution Sets Organization O01 - Army Construct for USCC C2 CONOPS O02 - Develop Robust CEM Element O06 - Army Cyber CoE Training T01 - Develop Army Cyber LDE&T Strategy Materiel M02 - Produce Cyber JCIDS Documents M04 - Transition Cyber Ops Arch/Infrastructure M06 - Implement IEWS M07 - Army Cyberspace Ops Arch/Infra Leader Development L01 - Specialized CMF Cyber LDE&T L02 - Incorporate basic cyberspace objectives L03 Develop cyber specific LD&E objectives in non-cyber LDE&T training Personnel P03 - Cyberspace Planners BCT to ASCC P05 - Manpower study (USCC & CEM Element) Facilities F02 - Ensure Adequacy of Facilities & Ranges Policy Policy06 - Army Materiel Development Strategy Organization O Integration Training T04 - Continue NETOPS Training Program T05 - Cyberspace / EW Modeling & Simulation T06 - Develop Digital Literacy Fitness Program T07 - Enterprise IA Awareness Training Materiel M01 - Providing Timely Cyber / EA Payloads Personnel P02 - MOS 25D / 35Q / 255S / FA 26 Facilities F01 - Service Facilities Assessment Policy Policy01 - Update Regulations (Army / DoD / USC) Policy02 - Update Title 10 for DCO-RA Policy03 - LandWarNet / JIE & GNE alignment Policy04 - Securing CONUS Infrastructure Policy05 - RC Alignment for ARFORGEN Organization O04 - Army Service Theater Cyber Organizations O05 - Develop Army Cyber and EW Tactical Units Training T02 - Legal/JAG Cyber Operations Training T03 - Leverage Joint Cyber Training Exercise Materiel M03 - Develop Mobile SCIFs M05 - Army Cyberspace Innovation Program Personnel P01 - Cyber S&T/RDT&E Personnel P04 - Review roles of cyber workforce Facilities F03 - Identify agency for facilities / ranges Policy Policy07 - Army Service Cyber Roadmap Policy08 - Cyber QRCs and Review Board Policy09 - Support to Cyber Mobilization Strategy Policy10 - JCIDS Modification Solution Set # 1 Solution Set # 2 Solution Set # 3 13

14 Way Ahead 14 14

15 15 DOMTMLPF Integrated Capabilities Recommendation (DICR) The DICR focuses on those Cyber CBA Solutions not currently being implemented. Doctrine FM 3-12 Cyberspace Operations (in progress) Organization Organization Develop a robust and capable Cyber Electromagnetic (CEM) Element, ASCC to BCT (Cyber CBA O02). Create Army Service Theater Cyber Organizations (Cyber CBA O04) COMPLETE Develop Army Cyber and EW tactical units (Cyber CBA O05). Training Assess and identify legal support to cyberspace operations for Judge Advocate General (JAG) Training (Cyber CBA T02). Leverage a Joint Cyber Training Enterprise (Cyber CBA T03). Incorporate cyberspace and EW modeling and simulation (M&S) capabilities into cyberspace and EW training and exercises (Cyber CBA T05). Leadership & Education Incorporate additional specialized cyberspace training into specified Career Management Fields (CMF) and Functional Areas (FA) (Cyber CBA L01). Incorporate basic cyberspace learning objectives into the Officer Education System, Warrant Officer Education System, Noncommissioned Officer Education System, and Civilian Education System (Cyber CBA L02). Develop cyber specific LD&E objectives in non-cyber LDE&T training (educate and train the force) (Cyber CBA L03). Personnel Determine Personnel Requirements in the Research, Development, Test, and Evaluation (RDT&E) Research Development, Acquisition (RDA), and Science and Technology (S&T) Communities (Cyber CBA P01). Add Cyberspace Operations Planners to the CEM Element, at BCT to ASCC (Cyber CBA P03). Conduct a manpower study for USCC C2 CONOPS and CEM Element (Cyber CBA P05). Facilities Conduct Army Service Facilities Assessment and Strategy (Cyber CBA F01). Ensure adequate facilities and ranges are available (Cyber CBA F02). Identify a Service coordination agency for Army and joint cyber ranges (Cyber CBA F03). 15

16 Questions 16

US Army EW Training Overview. LTC Steve Oatman TRADOC Capability Manager Electronic Warfare (TCM EW) 30 JUL 2014

US Army EW Training Overview. LTC Steve Oatman TRADOC Capability Manager Electronic Warfare (TCM EW) 30 JUL 2014 US Army EW Training Overview LTC Steve Oatman TRADOC Capability Manager Electronic Warfare (TCM EW) 30 JUL 2014 UNCLASSIFIED Agenda EW School Mission Doctrine EW Courses FA29 290A WOBC 290A WOAC 29E AOEWC

More information

Army Intelligence Industry Day Foundation Layer Technology Focus Areas

Army Intelligence Industry Day Foundation Layer Technology Focus Areas CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,

More information

Center of Excellence Concept Plan

Center of Excellence Concept Plan 1 Agenda Spectrum Management Operations have evolved in recent years from a pre-mission planning task into an ongoing operational activity spanning well beyond Signal operations across all Warfighting

More information

FM 6-02 SIGNAL SUPPORT TO OPERATIONS

FM 6-02 SIGNAL SUPPORT TO OPERATIONS FM 6-02 SIGNAL SUPPORT TO OPERATIONS JANUARY 2014 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at

More information

DoD Strategy for Defending Networks, Systems, and Data

DoD Strategy for Defending Networks, Systems, and Data DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July

More information

Department of Defense NetOps Strategic Vision

Department of Defense NetOps Strategic Vision Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps

More information

LandWarNet Initial Capabilities Document NetOps Tools Convergence Strategy Update

LandWarNet Initial Capabilities Document NetOps Tools Convergence Strategy Update 1 LandWarNet Initial Capabilities Document NetOps Tools Convergence Strategy Update 11 September 2013 Al Morrison TCM GNE Signal CDID 1. LandWarNet Initial Capabilities Document (LWN ICD) LandWarNet ICD

More information

Army Doctrine Update

Army Doctrine Update Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near

More information

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate

More information

Cyber Situational Awareness - Big Data Solution

Cyber Situational Awareness - Big Data Solution Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and

More information

Cyberspace Operations

Cyberspace Operations Joint Publication 3-12 (R) R TMENT THI S W E' L L O F D E F E N D THE ARMY DEPA U NI TE D S TAT E S F O A AME RI C Cyberspace Operations 5 February 2013 PREFACE 1. Scope This publication provides joint

More information

Network Operations (NetOps)

Network Operations (NetOps) Network Operations (NetOps) COL Debbie Theall Project Manager, PM I3C2 22 May 2013 UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 1 UNCLASSIFIED Agenda UNCLASSIFIED Context NetOps

More information

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST

More information

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY

More information

AUSA Background Brief

AUSA Background Brief AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of

More information

Partnering with Small Business

Partnering with Small Business Partnering with Small Business Small Business Breakfast Ms. Essye Miller Director, Cyber Security, Army CIO/G-6 1 UNCLASSIFIED Army CIO/G-6 Organization CIO / G-6 Deputy, CIO / G-6 LTG Robert Ferrell Mr.

More information

SIGNAL SOLDIER S GUIDE

SIGNAL SOLDIER S GUIDE FM 6-02.43 SIGNAL SOLDIER S GUIDE March 2009 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army

More information

Systems Engineering and Integration Efforts. 11 Dec 2013

Systems Engineering and Integration Efforts. 11 Dec 2013 Systems Engineering and Integration Efforts 11 Dec 2013 Mr. Leo Smith Director, PoR Engineering Support ASA(ALT) System of Systems Engineering & Integration Directorate (SOSE&I) Approved for Public Release;

More information

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,

More information

Joint Communications System

Joint Communications System Joint Publication 6-0 R TMENT THI S W E' L L O F D E F E N D THE ARMY DEPA U NI TE D S TAT E S F O A AME RI C Joint Communications System 10 June 2015 This publication is the keystone document for communications

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

Operationally Focused CYBER Training Framework

Operationally Focused CYBER Training Framework Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation

More information

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs

More information

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation

More information

FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY

FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY A d d r e s s C i t y, S t a t e Z i p FEDERAL RÉSUMÉ Client Name E m a i l A d d r e s s P h o n e N u m b e r Citizenship: U.S. Citizen Veteran Status: Retired Job Announcement Number: ABDC-4894892 Job

More information

ADRP20 AUGUST201 HEADQUARTERS,DEPARTMENTOFTHEARMY

ADRP20 AUGUST201 HEADQUARTERS,DEPARTMENTOFTHEARMY ADRP20 I NTELLI GENCE AUGUST201 2 DI STRI BUTI ONRESTRI CTI ON: Appr ov edf orpubl i cr el eas e;di s t r i but i oni sunl i mi t ed. HEADQUARTERS,DEPARTMENTOFTHEARMY This publication is available at Army

More information

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST

More information

Director of Intelligence Proposed Research Topics

Director of Intelligence Proposed Research Topics Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC 20350-3000 Sept 2011 DIRINT Suggested Graduate Program Thesis

More information

Cyber Domain and LandWarNet: Powering the Army AUSA 2012

Cyber Domain and LandWarNet: Powering the Army AUSA 2012 Cyber Domain and LandWarNet: Powering the Army AUSA 2012 Lead: LTG Rhett A. Hernandez, Commanding General, United States Army Cyberspace Command LTG Donald M. Campbell, Jr., Commanding General, III Corps

More information

Army Foundry Intelligence Training Program

Army Foundry Intelligence Training Program Army Regulation 350 32 Training Army Foundry Intelligence Training Program Headquarters Department of the Army Washington, DC 2 June 2015 UNCLASSIFIED SUMMARY of CHANGE AR 350 32 Army Foundry Intelligence

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Army Cloud Computing Strategy

Army Cloud Computing Strategy Army Cloud Computing Strategy MARCH 2015 Enterprise Architecture Division Army Architecture Integration Center HQDA CIO/G-6 Version 1.0 This page intentionally left blank. TABLE OF CONTENTS FOREWORD...

More information

Human Resources Management. Portfolio Management Concept of Operations

Human Resources Management. Portfolio Management Concept of Operations Human Resources Management Portfolio Management Concept of Operations September 30, 2012 Table of Contents 1.0 Overview... 2 1.1 Background... 2 1.2 Purpose... 2 1.3 Organization of This Document... 2

More information

DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE

DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:

More information

A Comprehensive Cyber Compliance Model for Tactical Systems

A Comprehensive Cyber Compliance Model for Tactical Systems A Comprehensive Cyber Compliance Model for Tactical Systems Author Mark S. Edwards, CISSP/MSEE/MCSE Table of Contents July 28, 2015 Meeting Army cyber security goals with an IA advocate that supports tactical

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior

More information

Cyber Workforce Training

Cyber Workforce Training Cyber Workforce Training Mr Steve Jurinko DISA/PEO-MA 13 May 2014 1 DISA Cybersecurity Workforce Initiatives Cyber Workforce Coding DOD CIO initiative To identify the Cyber Workforce (CWF) across DISA

More information

DOCUMENT CHANGE RECORD

DOCUMENT CHANGE RECORD DOCUMENT CHANGE RECORD Version Number Date Description V 0.1 April 19, 2010 Pre-Decisional Draft Release V 0.2 July 23, 2010 Pre-Decisional Draft Release V 0.3 September 15, 2010 Pre-Decisional Draft Release

More information

Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING

Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING SECNAV INSTRUCTION 1543.2 From: Secretary of the Navy SECNAVINST 1543.2 DON CIO Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING Ref: See Enclosure (1) Encl: (1) References (2) Responsibilities

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8320.05 August 18, 2011 ASD(NII)/DoD CIO SUBJECT: Electromagnetic Spectrum Data Sharing References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive

More information

FORT BRAGG, NC JOB POSTINGS

FORT BRAGG, NC JOB POSTINGS FORT BRAGG, NC JOB POSTINGS Release date: 7/28/15 To apply for these positions, please send your cover letter and resume to: HR@ICPSYSTEMS.COM. Thanks! These are the positions available at this time: 1.

More information

Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)

Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS) Department of Defense DIRECTIVE NUMBER 4630.05 May 5, 2004 Certified Current as of April 23, 2007 ASD(NII)/DoD CIO SUBJECT: Interoperability and Supportability of Information Technology (IT) and National

More information

THE MILITARY APPLICATIONS OF CLOUD COMPUTING TECHNOLOGIES

THE MILITARY APPLICATIONS OF CLOUD COMPUTING TECHNOLOGIES THE MILITARY APPLICATIONS OF CLOUD COMPUTING TECHNOLOGIES A Monograph By MAJ Dallas A. Powell, jr. SAMS Class 13-01, U.S. Army School of Advanced Military Studies United States Army Command and General

More information

Cyber Superiority. Weapon System Normalization Update. Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority. AFCEA Luncheon Jan 2015

Cyber Superiority. Weapon System Normalization Update. Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority. AFCEA Luncheon Jan 2015 Cyber Superiority Weapon System Normalization Update AFCEA Luncheon Jan 2015 Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority Overview A5/8 Organization Where We Were/Are Way Forward Challenges

More information

Joint Information Environment Single Security Architecture (JIE SSA)

Joint Information Environment Single Security Architecture (JIE SSA) Joint Information Environment Single Security Architecture (JIE SSA) Danielle Metz DISA JIE Special Assistant to the Mission Assurance Executive /JIE SSA Integrated Design Team Lead 12 May 2014 Problem

More information

The State of DoD Biometrics

The State of DoD Biometrics The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E thomas.dee@osd.mil 1 Agenda What We ve Done Biometrics

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

DISA and the Evolving DoD Enterprise

DISA and the Evolving DoD Enterprise 1 DISA and the Evolving DoD Enterprise 11 June 2014 Major General Alan R. Lynn Vice Director, Defense Information Systems Agency 20th Century Circuit & Dial tone Delivery UNCLASSIFIED DISA is Changing

More information

Cyber Mission Analysis

Cyber Mission Analysis Cyber Mission Analysis Mission Analysis for Cyber Operations of Department of Defense Submitted in compliance with the reporting requirement contained in the Fiscal Year 2014 National Defense Authorization

More information

Security and Emergency Services Community of Interest 0089 Emergency Management Career Road Map

Security and Emergency Services Community of Interest 0089 Emergency Management Career Road Map Security and Emergency Services Community of Interest 0089 Emergency Management Career Road Map Prepared by: Booz Allen Hamilton Career Progression within the 0089 Occupational Series is Marked by Support

More information

Cybersecurity: The Defense Perspective

Cybersecurity: The Defense Perspective Cybersecurity: The Defense Perspective Ms. Essye Miller Director, Cybersecurity Army CIO/G-6 October 15, 2015 1 CIO/G-6 As the CIO As the G-6 Reports directly to the Secretary of the Army for setting the

More information

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING BACKGROUNDER Point of Contact: Mr. James L. Lindsey (703) 704-0194 James.L.Lindsey8.civ@mail.mil PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING Product Director, Enterprise Content,

More information

Leading Teams of Army Cyber Warriors

Leading Teams of Army Cyber Warriors To: Company Commanders From: Company-grade Cyber Leaders Leading Teams of Army Cyber Warriors Our mission is to fight and win our nation s wars across all operational domains: land, sea, air, space and

More information

Simulation and Training Solutions

Simulation and Training Solutions Simulation and Training Solutions Strong Learning Experiences Available Nowhere Else Advancing Operational Readiness with Leading-Edge Simulation and Training The rapid evolution of military missions,

More information

U.S. Military Cybersecurity-related Provisions Comparison Fiscal Year 2014 Space Foundation Page 1 of 13

U.S. Military Cybersecurity-related Provisions Comparison Fiscal Year 2014 Space Foundation Page 1 of 13 U.S. Military Cybersecurity-related Provisions Comparison for Fiscal Year 2014 Update 2 U.S. House of Representatives passed FY 2014 National Defense Authorization Act [NDAA] Act (H.R. 1960); U.S. Senate

More information

This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html).

This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). *FM 3-13 Field Manual No. 3-13 Headquarters Department of the Army Washington, DC, 25 January

More information

Ms. Sandy Veautour Chief Systems Engineer PSG

Ms. Sandy Veautour Chief Systems Engineer PSG Ms. Sandy Veautour Chief Systems Engineer PSG SBIR Initiatives Phase I FY 07 3 Awards High Speed Wireless 3-D Video Transmission to Support Virtual Dismounted Training 2 Phase I contract awards Battlefield

More information

The DoD CIO Charter:

The DoD CIO Charter: George Mason University, Fairfax, VA The DoD CIO Charter: A Template for I.T. Governance? Paul A. Strassmann,October 3, 2005 1 Authority for the DoD CIO 2 Traditional Views of the CIO Roles 3 An Expansive

More information

Cybersecurity Strategic Talent Management. March, 2012

Cybersecurity Strategic Talent Management. March, 2012 Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,

More information

U.S. Army Network Operations Reference Architecture. (Aligned to the DOD Enterprise)

U.S. Army Network Operations Reference Architecture. (Aligned to the DOD Enterprise) U.S. Army Network Operations Reference Architecture (Aligned to the DOD Enterprise) Version 1.0 6 March 2014 Executive Summary The Army relies on the current Network to support warfighting and business

More information

FM 1-04 LEGAL SUPPORT TO THE OPERATIONAL ARMY

FM 1-04 LEGAL SUPPORT TO THE OPERATIONAL ARMY FM 1-04 LEGAL SUPPORT TO THE OPERATIONAL ARMY MARCH 2013 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available

More information

Headquarters Department of the Army

Headquarters Department of the Army ATP 4-93 Sustainment Brigade August 2013 DISTRIBUTION RESTRICTION. Approved for public release; distribution is unlimited. Headquarters Department of the Army This publication is available at Army Knowledge

More information

Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0

Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0 Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0 Volume I Management Overview of the DoD IEA July 2012 Prepared by: Department of Defense Office of the Chief Information

More information

Operational Energy Strategy: Implementation Plan

Operational Energy Strategy: Implementation Plan Operational Energy Strategy: Implementation Plan Department of Defense March 2012 Preparation of this report/study cost the Department of Defense 2011 - a 2012. total of approximately Generated $240,000

More information

Data Intensive Science and Computing

Data Intensive Science and Computing DEFENSE LABORATORIES ACADEMIA TRANSFORMATIVE SCIENCE Efficient, effective and agile research system INDUSTRY Data Intensive Science and Computing Advanced Computing & Computational Sciences Division University

More information

COMMAND AND CONTROL OF DETAINEE OPERATIONS

COMMAND AND CONTROL OF DETAINEE OPERATIONS FMI 3-63.6 COMMAND AND CONTROL OF DETAINEE OPERATIONS September 2005 Expires September 2007 HEADQUARTERS, DEPARTMENT OF THE ARMY DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

More information

AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013

AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013 AIR- SEA BATTLE Service Collaboration to Address Anti-Access & Area Denial Challenges White PantoneBlackC PantoneReflexBlueC Pantone 116C Pantone 165C Pantone 422C Pantone 471C Pantone 551C May 2013 This

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

ADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

ADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. ADP 3-0 UNIFIED LAND OPERATIONS OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army

More information

Navy Information Dominance Industry Day

Navy Information Dominance Industry Day Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic

More information

This Conference brought to you by www.ttcus.com

This Conference brought to you by www.ttcus.com This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com U.S. Army Intelligence and Security Command Army

More information

NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN

NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN 2013-2018 2 NAVAL SEA SYSTEMS COMMAND Foreword Everything the United States Navy brings to the fight, and ultimately does for the nation, is delivered

More information

Rear Detachment Commander. Computer-Based Training. Module 10: Training Management

Rear Detachment Commander. Computer-Based Training. Module 10: Training Management Rear Detachment Commander Computer-Based Training Module 10: Training Management Table of Contents 1. TRAINING MANAGEMENT... 1 1.1. IMPLEMENTING A TRAINING PLAN... 1 1.1.1. Principles Of Training... 2

More information

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT) Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE

UNCLASSIFIED R-1 ITEM NOMENCLATURE Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Office of Secretary Of Defense DATE: April 2013 COST ($ in Millions) All Prior Years FY 2012 FY 2013 # Base OCO ## FY 2015 FY 2016 FY 2017 FY 2018

More information

Leveraging Virtualization Technology for Command and Control Systems Training

Leveraging Virtualization Technology for Command and Control Systems Training Leveraging Virtualization Technology for Command and Control Systems Training Joseph J. Connery, Jr., Robert C. Callahan, Dr. Philip N. Brown NORAD and USNORTHCOM/J7 Joint Training and Exercises Directorate

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

Defining a Secure Mobile Framework Architecture at DHA

Defining a Secure Mobile Framework Architecture at DHA Ms. Janine Oakley, Transition Manager Innovation and Advanced Technology Development Division 2015 Defense Health Information Technology Symposium Defining a Secure Mobile Framework Architecture at DHA

More information

Working Group 9 Cyber Analysis

Working Group 9 Cyber Analysis Working Group 9 Cyber Analysis Co-Chair: Mr. David Silvernail Space and Missile Defense Command (SMDC), Huntsville, AL. david.l.silvernail.civ@mail.mil Co-Chair: Mr. Paul Works TRADOC Analysis Center (TRAC),

More information

Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE

Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE D E PAR TME NT OF THE N A VY OFFICE OF T HE SECRET ARY 1000 NAVY PENT AGON WASHINGT ON D C 20350-1000 SECNAVINST 5239.20 DON CIO SECNAV INSTRUCTION 5239.20 From: Secretary of the Navy Subj: DEPARTMENT

More information

1. Contracting Officer Representative (COR)

1. Contracting Officer Representative (COR) DRAFT 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Contract Number: Task Order Number: United States Cyber Command (USCYBERCOM) OMNIBUS Performance Work Statement (PWS) USCYBERCOM Cyber Operations (J3) Task

More information

Forecast to Industry 2015

Forecast to Industry 2015 Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:

More information

Headquarters Department of the Army

Headquarters Department of the Army ATP 6-01.1 (FM 6-01.1) Techniques for Effective Knowledge Management MARCH 2015 DISTRIBUTION RESTRICTION. Approved for public release; distribution is unlimited. Headquarters Department of the Army This

More information

Reliable, Repeatable, Measurable, Affordable

Reliable, Repeatable, Measurable, Affordable Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you

More information

Deputy Assistant Secretary of Defense for Cyber, Identity, and Information Assurance Strategy

Deputy Assistant Secretary of Defense for Cyber, Identity, and Information Assurance Strategy Deputy Assistant Secretary of Defense for Cyber, Identity, and Information Assurance Strategy August 2009 The Office of the Assistant Secretary of Defense for Networks and Information Integration / DoD

More information

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES. Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive

More information

Milper Message Number 15-166 Proponent ATZH-CS INITIAL MOS 170A WARRANT OFFICER CYBER BRANCH VOLUNTARY TRANSFER...Issued: [04 Jun 15]...

Milper Message Number 15-166 Proponent ATZH-CS INITIAL MOS 170A WARRANT OFFICER CYBER BRANCH VOLUNTARY TRANSFER...Issued: [04 Jun 15]... Milper Message Number 15-166 Proponent ATZH-CS INITIAL MOS 170A WARRANT OFFICER CYBER BRANCH VOLUNTARY TRANSFER...Issued: [04 Jun 15]... A. AR 614-100 (OFFICER ASSIGNMENT POLICIES, DETAILS, AND TRANSFERS),

More information

Test/Cyber Requirements and Capability Gaps Abstract

Test/Cyber Requirements and Capability Gaps Abstract Test/Cyber Requirements and Capability Gaps Abstract The use of cyberspace operations to defend supported networks and project power through the digital domain is at the leading edge of new age warfare.

More information

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,

More information

US Army Intelligence and Security Command (INSCOM)

US Army Intelligence and Security Command (INSCOM) US Army Intelligence and Security Command (INSCOM) Overview Briefing for National Defense Industrial Association (NDIA) Presented by Brigadier General Robert L. Walter Jr. INSCOM Deputy Commanding General

More information

When developing capabilities, the Army. I never blame myself when I m not hitting. I just blame the bat, and if it keeps up, I change bats.

When developing capabilities, the Army. I never blame myself when I m not hitting. I just blame the bat, and if it keeps up, I change bats. (Photo by Capt. Meredith Mathis, U.S. Army) Spc. Casey Payne (left), 201st Expeditionary Military Intelligence Brigade, and Sgt. Andrew Lee, Company D, 14th Brigade Engineer Battalion, 2-2 ID (SBCT), pull

More information

STATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE

STATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE STATEMENT OF GENERAL KEITH B. ALEXANDER, USA COMMANDER, UNITED STATES CYBER COMMAND DIRECTOR, NATIONAL SECURITY AGENCY CHIEF, CENTRAL SECURITY SERVICE BEFORE THE SENATE COMMITTEE ON APPROPRIATIONS CYBERSECURITY:

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

Cyber Security Research and Development: A Homeland Security Perspective

Cyber Security Research and Development: A Homeland Security Perspective Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders

More information

DoD Mobility Kim Rice

DoD Mobility Kim Rice DoD Mobility Kim Rice Mobility PMO Contact: 301-225-5670 17 Jun 2015 DoD Mobility PMO Concept Vision: Secure, reliable and responsive infrastructure and services for the mobile users across the DoD. Mission:

More information

FM 4-0. Sustainment APRIL 2009. DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS DEPARTMENT OF THE ARMY

FM 4-0. Sustainment APRIL 2009. DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS DEPARTMENT OF THE ARMY FM 4-0 Sustainment APRIL 2009 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS DEPARTMENT OF THE ARMY This publication is available at Army Knowledge Online

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

PEO LAND SYSTEMS MARINE CORPS Planning Brief to Industry. 22 Sep 2015 Michael D. Halloran Director S&T, PEO LS

PEO LAND SYSTEMS MARINE CORPS Planning Brief to Industry. 22 Sep 2015 Michael D. Halloran Director S&T, PEO LS PEO LAND SYSTEMS MARINE CORPS Planning Brief to Industry 22 Sep 2015 Michael D. Halloran Director S&T, PEO LS 1 Who we are What we do So what? 2 PEO LS Established in 2007 to enhance acquisition oversight

More information