Joint Information Environment
|
|
- Ashley Rose
- 7 years ago
- Views:
Transcription
1 Joint Information Environment 12 May 14 1
2 Agenda JIE Necessity DISA s JIE Focus Takeaways Introduction of Breakout Session Leads
3 DoD IT Future: Joint Information Environment A secure joint information environment, comprised of shared information technology (IT) infrastructure, enterprise services, and a single security architecture to achieve full spectrum superiority, improve mission effectiveness, increase security and realize IT efficiencies. JIE is operated and managed per Unified Command Plan (UCP) using enforceable standards, specifications, and common tactics, techniques, and procedures (TTPs). Source: 6 Jul 12 DMAG/13 Jul 12 Tank JIE is NOT: Program of Record / Joint Program Office Turn key solutions Independent way of doing things
4 Setting the Stage for C2 and Decision Support Data Access Joint Information Environment
5 Unclassified/Pre-decisional/FOUO JAN 2013 [With the JIE], we will have set the conditions for next generation capabilities, fully leveraging the power and versatility of commercial information technology and evolving from a brittle, network-centric understanding of our information environment to a flexible datacentric environment enabling access to information at the point of need. GEN Martin E. Dempsey, Chairman of the Joint Chiefs of Staff Our IT systems do not simply allow us to one another, chat online, and access the web for our administrative tasks. They are the backbone we use to interconnect Operations across multiple domains and deliver mission success around the globe.
6 Decentralized Architecture Today Decentralized Systems Increase Our Cyber Attack Surface Attack Surface Servers Data centers Service specific IT End user devices Servers Data centers Service specific IT End user devices Servers Data centers Service specific IT End user devices Servers Data centers Service specific IT End user devices Servers Data centers Mission unique IT End user devices Internet Access Points 3 Feb not defensible over the long run. General Alexander Commander, USCYBERCOM 6
7 The Operational Environment - Today Regional Operations with Global Effects Operation Gladiator Shield Global Cyber Levant Planning USEUCOM / USCENTCOM Operation Enduring Freedom ISAF-Afghanistan Office of Security Cooperation Iraq Operation Jukebox Lotus Juniper Micron USAFRICOM / USEUCOM Humanitarian Assistance USPACOM Requires a synchronized unified effort across a global infrastructure
8 Where We Are Going 3 Dec
9 Unclassified/Pre-decisional/FOUO The JIE Target State We need pioneers and visionaries and folks that are moving out to get us to where we need to go. We are not necessarily at a tipping point, but it is an informational point. the expectations on this agency are huge, they are tremendous and people are expecting us to build this out -Lt Gen Ronnie D. Hawkins, Jr., Director, DISA Our target objective state is a Joint Information Environment that optimizes the use of the DoD IT assets by converging communications, computing, and enterprise services into a single joint platform that can be leveraged for all Department missions. These efforts reduce total cost of ownership, reduce the attack surface of our networks, and enable DISA s mission partners to more efficiently access the information resources of the enterprise to perform their missions from any authorized IT device from anywhere in the world.
10 The Agency maintains four strategic goals. These goals and the supporting key objectives link our strategy to our day-to-day operations and guide us to build the DISA of tomorrow and achieve our Target Objective State. GOAL 1: Evolve the Joint Information Environment GOAL 2: Provide Joint Command and Control (JC2) and Leadership Support GOAL 3: Operate and Assure the Enterprise GOAL 4: Optimize Department Investments DISA Strategic Plan DISA Focus Area No. 1: DoD Joint Information Environment
11 Centralized Architecture Under the JIE Global Enterprise Operations Center w/ Enterprise Situational Awareness (SA) and C2 JIE Access Points (EOCs w/ Regional SA) DISN IP Transport Internet Access Points Enterprise Data Centers Enterprise Services Enterprise Cloud computing Identity Management Access Management Enterprise Portal Enterprise Licensing Enterprise Security System focused Application/data focused Implemented at key points Standardized configuration Simultaneously deployed controls Smaller more efficient force Visibility of entire JIE Real-time defensive operations 3 Feb
12 Joint Information Environment Globally Integrated Operations (Current Status May 2014) Global Continuum Through Regional Implementation EUROPEAN PACIFIC CONUS FOCUS: Concept Development Leverage JEN 1 st EOC Established TTPs 1 st JIE CDC, IAP, IPN SSA w/ JRSS FOCUS: Mission Partner Environment (MPE) interface with JIE Improved Cyber Resilience Data Center Consolidation from Unique PACOM operational area GEOC FOCUS: Build Joint Regional Security Stacks Establish MPLS Routing Core Delivers 11 JRSS Suites & MPLS Core Joint C2 (AF, AR, DISA) Regional Approach to Maturing the JIE and Integrating Technology Concurrently on a Global Basis
13 Single Security Architecture Collapses the network security boundaries Reduces the external attack surface Provides a defensible architecture Rapid and safe data sharing Enabling Activities (EUR) SA & C2 for initial B/P/C/S (Achieved Jul 13) Install SSA at the Core Data Center in Europe (Achieved Sep 13) Install SSA at the IAP (Achieved Nov 13) Install SSA at an IPN; JIE boundary protection implemented (Planned) Improve Warfighter C2 Improve Cyber C2 Efficiently Use Resources Securing data and its use, enabling Force-wide Collaboration Standardize security suites to inspect, block and collect Shrink the Domains Save 5-30 FTEs per Domain! 3 Dec
14 JIE Single Security Architecture, Big Data & Identity Access Management are the Foundation Identify aggregate Identify patterns and Access to all the raw Mine and Fuse data anomalous behaviors indicators that are data into observations that fit a malicious out of the norm profile Mar
15 JIE Operational Concept End-State 3-5 Years - Service-centric non-standard operations centers - Non-standard TTPs, architectures & applications - No standard ops architecture Now - GEOC established - Standardized TTPs - JIE ops architecture & Initial COP capability - Mixture of JIE EOCs and Service centers - Reduced number of CNDSPs End State Regionally Focused but Globally Available to Deliver Cyber Effects - Fully meshed EOCs provide seamless control and failover - EOCs in place for all non-service unique missions - JIE COP in place - Automated capabilities in place, e.g. compliance verification and reporting - Standard TTPs, Architectures & Applications15
16 DoD Data Center Consolidation Mission Partner Data Centers Effective and Optimized Use of Data Centers Converged IT Increased Security Reduced Attack Surface Single Security Architecture Reduced Cost Consolidated IT Investment Consistent IT Architecture Enterprise Level Efficiencies Simplified, Standardized, and Centralized Infrastructure Core Data Centers 3 April
17 Base w/15,000 people and 10 phone systems Firewalls require units to deploy their own infrastructure FTEs required for O&M in each enclave Fort A Camp F Base B Converged IP Transport Station G Camp C Base H Enclave A Enclave I Base D Post I Existing Architecture Enclave J Unified Capabilities Enclave B Enclave H DISN Backbone JIE Future Architecture Fort E Station J Enclave C Enclave G Enclave D Enclave F Enclave E Integration of voice, video & data delivered ubiquitously Enterprise Session Controllers serving 200,000 users in a geographic region Streamlined Troubleshooting Integration with other Enterprise Services Soft Phones 1% Hard Phones 99% Deterministic Routing / Single Point of Failure Dynamic Routing / Self Healing Soft Phones 80% Hard Phones 20% Converged Voice, Video, and Collaboration Services Across the DoD in Real Time
18 COCOMs SERVICES SERVICES SERVICES AGENCIES COALITIONS IC Consumers DoD Enterprise Cloud Service Catalog DoD Enterprise Cloud Service Broker DoD Cloud Broker Roles Consistent DoD Security: - Cloud security models approved by DSAWG - Well defined security levels correlated to protection requirements - Alignment with IC for classified levels - Models enable repeatable security assessments Customer Engagement: - Consolidated DoD-wide cloud requirements - Identified opportunities for partnerships, efficiencies, strategic sourcing, service availability gaps, etc. - Assessments provided customers with appropriate solution alternatives Providers IOC -Initial Service Catalog -Security Models -Limited Business Model -Matching criteria -Initial CRM Engagement with Service providers: - Established terms and conditions for future contract vehicles - Conducted security assessments for FEDRAMP approved providers - Working within DISA and in partnership with Services to establish contract vehicles that address requirement gaps FOC -Increased Service Offerings -Security monitoring/sa -Mature processes -Ordering/provisioning tools -Automated customer interface -- Consistent Security posture -- Partnerships to increase cloud service offerings -- Efficiencies through economies of scale 18
19 Defense Enterprise Mobility Mobile devices will provide access to the DoD Information Networks (DoDIN), allowing warfighters to operate within the JIE when and where needed. DISA is charged with deploying an unclassified enterprise Application Store that will deliver, update and delete apps on mobile devices without having to return the device for service. Department of Defense App Store Deployed - Good Deployed Mobile Iron In Review/Testing Requested The JIE will Eliminate the Barriers allowing Mobile Access to C2 and Decision Support Data 4 Mar
20 Takeaways JIE is an Operational Imperative DISA s Strategic Focus is on JIE Implementation Partnership with Industry is Key to Success
How To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
More informationSpace Ground Services in the Joint Information Environment (JIE)
Space Ground Services in the Joint Information Environment (JIE) Scott Niebuhr, Jeremy Burton, Judy Kerner, Sky Troyer The Aerospace Corporation 2015 The Aerospace Corporation Space Ground Services in
More informationDISA and the Evolving DoD Enterprise
1 DISA and the Evolving DoD Enterprise 11 June 2014 Major General Alan R. Lynn Vice Director, Defense Information Systems Agency 20th Century Circuit & Dial tone Delivery UNCLASSIFIED DISA is Changing
More informationUnified Capabilities (UC)
Unified Capabilities (UC) Andres J. Bryczek Unified Capabilities Development 6/11/2015 2:20 PM 18 Jun 2015 Unified Capabilities --What Do We Mean? Unified Capabilities Consolidate Phone Switches Streamline
More informationDEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
More informationBig Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation
More informationJoint Information Environment Single Security Architecture (JIE SSA)
Joint Information Environment Single Security Architecture (JIE SSA) Danielle Metz DISA JIE Special Assistant to the Mission Assurance Executive /JIE SSA Integrated Design Team Lead 12 May 2014 Problem
More informationDISA Testing Services for the Enterprise. Luanne Overstreet
DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information
More informationCyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
More informationUnified Capabilities (UC)
Unified Capabilities (UC) Lisa Belt UC Portfolio Manager DISA 14 May 2014 1 2 Unified Capabilities -- What Do We Mean? Unified Capabilities Consolidate Phone Switches Streamline IP Video Peer w/commercial
More informationDEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2014 2019 VERSION 2
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2014 2019 VERSION 2 A COMBAT SUPPORT AGENCY D E F E N S E I N F O R M A T I O N S Y S T E M S A G E N C Y Director s Intent Two years ago, I stated in
More informationThe Department of Defense Strategy for Implementing the Joint Information Environment
The Department of Defense Strategy for Implementing the Joint Information Environment September 18, 2013 The estimated cost of report or study for the Department of Defense is approximately $27,000 for
More informationDoD Joint Information Enterprise
DoD CIO DoD Joint Information Enterprise Mr. David DeVries DoD Deputy Chief Information Officer For Information Enterprise (IE) May 21, 2013 DoD s Cyber Footprint How Big? DoD IT User Base ~1.4 million
More informationSTATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
More informationForecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
More informationDoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
More informationAn Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
More informationTechnology Consulting. Infrastructure Consulting: Next-Generation Data Center
Technology Consulting Infrastructure Consulting: Next-Generation Data Center Page Next-generation Heading data centers: Page Sub Title Provisioning IT services for high performance Elasticity is not the
More informationDepartment of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
More informationIBM Dynamic Infrastructure - response on today's challenging business climate
Helping chief information officers respond to budget pressures Mārtiņš Grants IBM Latvia Global Technology Services Country Leader 01/04/2009 2009 IBM Corporation Agenda CIO challenges in the current tough
More informationDoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process
Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY
More informationIT Service Management in the JIE and the DoD Enterprise Service Management Framework
IT Service Management in the JIE and the DoD Enterprise Service Management Framework Office of the Chief Information Officer/ Defense Information Systems Agency Office of the Chief Information Officer
More informationDoD s Strategic Mobility Vision: Needs & Challenges
DoD s Strategic Mobility Vision: Needs & Challenges Greg Youst DISA Chief Mobility Engineer October 22, 2014 Agenda DoD Mobility Strategy Overview End-State Visions Implementation Challenges: A Reality
More informationUS Army Network Security Reference Architecture
US Army Network Security Reference Architecture (Aligned to the DoD Enterprise) Version 1.0 1 August 2013 Executive Summary The objectives of this Network Security Architecture are to reduce network complexity,
More informationNetworked. Field Services
Networked Field Services Table of Contents Overview.............................................3 Visibility and Enterprise Mobility.............................3 The New Networked Organization............................4
More informationAdvanced Systems & Development
Advanced Systems & Development Transitioning to an Enterprise Ground System Lt Col Matt Kimsal SMC/ADY Envisioning and Shaping the Future of Space BLUF SMC/AD is generating a plan for the transformation
More informationApplying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events
Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events Abstract Effective Security Operations throughout both DoD and industry are requiring and consuming unprecedented
More informationRapid Cyber Remediation Response Management. Using the Game-Changing Capabilities from Project Remedies Inc.
Rapid Cyber Remediation Response Management Using the Game-Changing Capabilities from Project Remedies Inc. A White Paper from Project Remedies Inc. January 2014 Abstract Rapid Cyber Remediation Response
More informationReview of the Total Information Technology Operations Cost for the Pentagon Reservation and National Capital Region
Review of the Total Information Technology Operations Cost for the Pentagon Reservation and National Capital Region Response to the Deputy Secretary of Defense (DSD) Memo subject Review of the Total Costs
More informationDISA Acquisition Opportunities
DISA Acquisition Opportunities 2014 Forecast to Industry 1 CAE Acquisition Opportunities GCCS-J Program support Base year and one 1 year option with total estimated value of $5M Current PoP ends 28 Nov
More informationAPAN Brief. Governance
APAN Brief Governance Table of Contents Roles and Relationships Significant Events Program Management Governance Overview Responsibilities Points of Contact Acronyms 2 Roles and Relationships OVERSIGHT
More informationCyber Superiority. Weapon System Normalization Update. Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority. AFCEA Luncheon Jan 2015
Cyber Superiority Weapon System Normalization Update AFCEA Luncheon Jan 2015 Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority Overview A5/8 Organization Where We Were/Are Way Forward Challenges
More information2014 Defense Health Information Technology Symposium Cloud Computing in the Defense Health Agency
Maj Todd Roman, SM Project Officer Mr. Andrew Jake Jacobs, Strategy Officer 2014 Defense Health Information Technology Symposium Cloud Computing in the Defense Health Agency 1 DHA Vision A joint, integrated,
More informationWhat is Unified Capabilities?
Unified Capabilities and Tactical Overview 7 May 2012 Version 3 What is Unified Capabilities? A Combat Support Agency Enterprise Network Convergence DoD Unified Capabilities Voice Video Data Tactical The
More informationEnabling the University CIO Strategic Plan 2013-2018. Vision for 2020. Mission
Enabling the University CIO Strategic Plan 2013-2018 NDU will create exceptional and innovative solutions and services that enable advanced joint education, leadership and scholarship (NDU Strategic Plan
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
More informationSUBJECT: Joint Information Environment Implementation Guidance
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 SEP 2 6 2013 CHIEF INFORMATION OFFICER MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF STAFF
More informationCLOUD COMPUTING SERVICES CATALOG
CLOUD COMPUTING SERVICES CATALOG... Including information about the FedRAMP SM authorized Unclassified Remote Hosted Desktop (URHD) Software as a Service solution CTC Cloud Computing Services Software
More informationNetwork Management and Defense Telos offers a full range of managed services for:
Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:
More informationPhysical Infrastructure Management Solutions
Physical Infrastructure Management Solutions Physical Infrastructure Challenges Require Innovative Solutions The Need for In-Depth Network Intelligence. With increased acceptance of virtualization, cloud
More informationLocal Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future
White Paper Local Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future What You Will Learn The future of the Department of Defense s (DoD) networks focuses on the
More informationA Combat Support Agency
Department t of Defense (DoD DoD) Enterprise Email May 9, 2012 v2 Agenda Purpose: Create awareness of Department of Defense (DoD) Enterprise Email and increase AGENDA understanding of the service ss benefits
More informationReasons Enterprises. Prefer Juniper Wireless
Reasons Enterprises Prefer Juniper Wireless Juniper s WLAN solution meets the mobility needs of today s enterprises by delivering the highest levels of reliability, scalability, management, and security.
More informationCore Data Center Reference Architecture
Core Data Center Reference Architecture DoD Enterprise Architecture Conference 2012 Office of the Chief Information Officer Topics Background DoD CIO Vision for Core Data Centers Core Data Center Reference
More informationjourney to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
More informationEnhancing Business Performance Through Innovative Technology Solutions
Enhancing Business Performance Through Innovative Technology Solutions Contact Center = Customer Experience FIELD SERVICE Customer Service BACK OFFICE CONTACT CENTER BRANCH OFFICE Help Desk HR Finance
More informationDoD Mobility Kim Rice
DoD Mobility Kim Rice Mobility PMO Contact: 301-225-5670 17 Jun 2015 DoD Mobility PMO Concept Vision: Secure, reliable and responsive infrastructure and services for the mobile users across the DoD. Mission:
More informationHEALTHCARE SOLUTIONS
HEALTHCARE SOLUTIONS Healthcare solutions HEALTHCARE COMMUNICATIONS THE CHALLENGES The organisation is asking for improved communications, but resources and budget will not extend to a huge IP communications
More informationA Comprehensive Cyber Compliance Model for Tactical Systems
A Comprehensive Cyber Compliance Model for Tactical Systems Author Mark S. Edwards, CISSP/MSEE/MCSE Table of Contents July 28, 2015 Meeting Army cyber security goals with an IA advocate that supports tactical
More informationMarine Corps. Commercial Mobile Device Strategy
Marine Corps Commercial Mobile Device Strategy April 2013 THIS PAGE INTENTIONALLY LEFT BLANK FOREWORD The currently constrained budget environment requires us to balance fiscal responsibility and mission
More informationDriving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder
Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats Eva Chen CEO and Co-Founder Consistent Vision for 25 Years A world safe for exchanging
More informationInfrastructure Development Forecast to Industry
Infrastructure Development Forecast to Industry Mr. Jack Wilmer Executive, Infrastructure Directorate 2 November 2015 51 Infrastructure Development Mission & Vision Mission Vision Slogan Enabled by We
More informationSTATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
More informationArmy Cloud Computing Strategy
Army Cloud Computing Strategy MARCH 2015 Enterprise Architecture Division Army Architecture Integration Center HQDA CIO/G-6 Version 1.0 This page intentionally left blank. TABLE OF CONTENTS FOREWORD...
More informationCloud Computing Strategy
Department of Defense Chief Information Officer Cloud Computing Strategy July 2012 This page intentionally left blank EXECUTIVE SUMMARY In the current political, economic, and technological landscape,
More informationPRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING
BACKGROUNDER Point of Contact: Mr. James L. Lindsey (703) 704-0194 James.L.Lindsey8.civ@mail.mil PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING Product Director, Enterprise Content,
More informationThe dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
More informationData Consolidation and Application Optimization (DCAO) Organization
Data Consolidation and Application Optimization (DCAO) Organization 11 February 2015 Presented to: DON CIO IT Conference San Diego Convention Center Mr. John Pope DCAO Director Space and Naval Warfare
More informationDoD IT Enterprise Strategy and Roadmap Department of Defense (DoD) Information Technology (IT) Enterprise Strategy and Roadmap
Department of Defense (DoD) Information Technology (IT) Enterprise Strategy and Roadmap Version 1.0 6 SEP 11 September 2011 iii Foreword The number of networks the Department of Defense (DoD) uses to execute
More informationJuniper Networks Solution Portfolio for Public Sector Network Security
SOLUTION BROCHURE Juniper Networks Solution Portfolio for Public Sector Network Security Protect against Network Downtime, Control Access to Critical Resources, and Provide Information Assurance Juniper
More informationCost effective methods of test environment management. Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA
Cost effective methods of test environment management Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA 2013 Agenda Basic complexity Dynamic needs for test environments Traditional
More informationVladimir Yordanov Director of Technology F5 Networks, Asia Pacific v.yordanov@f5.com. Developments in Web Application and Cloud Security
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific v.yordanov@f5.com Developments in Web Application and Cloud Security Forces of Change Workforce and IT trends 2 Applications 3 Web Application
More informationMcAfee Endpoint Protection Products
McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc. Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough
More informationSecurity Coordination with IF-MAP
Security Coordination with IF-MAP Matt Webster, Lumeta 28 Sept 2010 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Recap of TNC Explanation of IF-MAP What is IF-MAP?
More informationUpdate On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
More informationLong Term Evolution (LTE) for Public Safety
S T R A T E G I C W H I T E P A P E R Long Term Evolution (LTE) for Public Safety Enabling Flexible Business Models To provide seamless data communication during emergencies, public safety practitioners
More informationMHS Health Information Technology Transformation March 1, 2016
MHS Health Information Technology Transformation March 1, 2016 Colonel Richard Chip Terry Acting Military Health System Chief Information Officer Defense Health Agency Conflict of Interest Richard N. Terry,
More informationGlobal Video Services (GVS)
Global Video Services (GVS) Heidi Cotter GVS PMO 17 Jun 2015 UNCLASSIFIED 1 Agenda Overview GVS Capabilities Features Operational Tier Support How to Order GVS Helpful Links Contacts UNCLASSIFIED 2 Global
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationData Security as a BDM Best Practice
Data Security as a BDM Best Practice David Loshin, President, Knowledge Integrity Robert Shields, CISSP, Director, PMM Data Security Group May 23, 2016 About the Speaker David Loshin President, Knowledge
More informationGuidelines for Virtual Transportation Management Center Development. National Rural ITS Meeting August 27, 2014
Guidelines for Virtual Transportation Management Center Development National Rural ITS Meeting August 27, 2014 1 Project Purpose Overview To develop a guidebook that provides technical guidance on planning
More informationBruce Rogers. Forbes. Chief Insights Officer and Head of the CMO Practice
Publish or Perish Bruce Rogers Forbes Chief Insights Officer and Head of the CMO Practice Publish or Perish A CMO Roadmap for Managing, Systematizing, and Optimizing The Marketing Content Supply Chain
More informationTWD WHITE PAPER. Implementing Next-Generation Network Infrastructures for Cloud Migration
TWD WHITE PAPER Implementing Next-Generation Network Infrastructures for Cloud Migration Implementing Next-Generation Network Infrastructures for Cloud Migration Introduction Enterprise information technology
More informationEnterprise Services to the Edge
Enterprise Services to the Edge Mr. Jeremy Hiers Project Director, PD ES 22 May 2013 UNCLASSIFIED P D E S O V E R V I E W 1 UNCLASSIFIED Agenda UNCLASSIFIED Who is PD Enterprise Services? Concept for Enterprise
More informationCyber Workforce Training
Cyber Workforce Training Mr Steve Jurinko DISA/PEO-MA 13 May 2014 1 DISA Cybersecurity Workforce Initiatives Cyber Workforce Coding DOD CIO initiative To identify the Cyber Workforce (CWF) across DISA
More informationUncomplicated Communications
Unified Communications & Collaboration Strategy Delivering Uncomplicated Communications What If I Could? Citizens are delivered innovative collaboration tools daily that find and connect people and data
More informationof interaction. Operate with Efficiency. Manage the Operation. Connect with Customers. Enhance with Mobility. For Table Service Restaurants
Experience a new world of interaction. Operate with Efficiency. Manage the Operation. Connect with Customers. Enhance with Mobility. For Table Service Restaurants 02 Experience a new world of interaction
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationCloud Computing Strategy
Department of Defense Chief Information Officer Cloud Computing Strategy July 2012 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is
More informationJuniper Networks Solution Portfolio for Public Sector Network Security
Solution Brochure Juniper Networks Solution Portfolio for Public Sector Network Security Protect against Network Downtime, Control Access to Critical Resources, and Provide Information Assurance STRM NS-Security
More informationThis Conference brought to you by www.ttcus.com
This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com U.S. Army Intelligence and Security Command Army
More informationBOUNDARYLESS DATACENTERS (BLDC)
WWW.WIPRO.COM BOUNDARYLESS DATACENTERS (BLDC) SMART DIGITAL TRANSFORMATION ENABLER SMART DIGITAL TRANSFORMATION ENABLED DO BUSINESS BETTER DIGITIZE AND MOVE AHEAD Digitalization is disrupting and challenging
More informationReliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
More informationTABLE OF CONTENTS. Section 5 IPv6... 5-1 5.1 Introduction... 5-1 5.2 Definitions... 5-1 5.3 DoD IPv6 Profile... 5-3 5.3.1 Product Requirements...
, Table of Contents TABLE OF CONTENTS SECTION PAGE IPv6... 5-1 5.1 Introduction... 5-1 5.2 Definitions... 5-1 5.3 DoD IPv6 Profile... 5-3 5.3.1 Product Requirements... 5-4 i , List of Figures LIST OF FIGURES
More informationCisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
More informationApplication Performance Management for Enterprise WANs
Whitepaper Application Performance Management for Enterprise WANs A 3 makes a significant difference to my ability to see what is actually going on and to align my available resource to the most critical
More informationReasons to Choose the Juniper ON Enterprise Network
Reasons to Choose the Juniper ON Enterprise Network Juniper s enterprise access products meet the always-on needs of today s enterprises by delivering solutions that are reliable, simple, and smart. The
More informationCitrix Lifecycle Management
Citrix Lifecycle Management Comprehensive cloud-based service lifecycle management solution IT administrators are realizing that application deployments are getting more complex and error-prone than ever
More informationCapital Markets Day. Capital Markets Day. Gamma Communications plc
Gamma Communications plc 1 About Gamma Gamma is a rapidly growing, technology-based, provider of communications services to the UK business market Provides integrated voice, data, and mobile telecoms services
More informationSecureVue Product Brochure
SecureVue unifies next-generation SIEM, security configuration auditing, compliance automation and contextual forensic analysis into a single platform, delivering situational awareness, operational efficiency
More informationIP Telephony: Reliability You Can Count On
WHITE PAPER IP Telephony: Reliability You Can Count On Architecture Matters Table of Contents 1. IP Delivers a Foundation for Reliability...3 2. Compare Three Different Approaches to Delivering Five-Nines
More informationMission Partner Environment DISA Multinational Information Sharing
Mission Partner Environment DISA Multinational Information Sharing Col Roman Hund, USAF PM DISA MNIS 13 May 2014 1 JIE MPE Tier 1 and Tier 2 Persistent CCDR level US Centric Bi-lateral /Multi-lateral Specified
More informationPalo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation
More informationAT&T. ip vpn portfolio. integrated. IP VPN solutions. for the enterprise. Communication Systems International Incorporated
AT&T ip vpn portfolio integrated IP VPN solutions for the enterprise Communication Systems International Incorporated Applications of IP VPN Technology Applications of IP VPN Technology Sales Force Automation
More informationGAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
More informationLexmark Enterprise Software. Transforming customer engagement
Lexmark Enterprise Software Transforming customer engagement Customer relationships are the lifeblood of your business Whether you serve businesses, consumers, patients, students or citizens, the quality
More informationwe can Automating service delivery for the dynamic data center of the future Brandon Whichard
Executive Brief Automate Service Delivery September, 2010 addressing today s problems while setting the stage for an agile infrastructure Automating service delivery for the dynamic data center of the
More informationSecuring the Cloud: Making Cloud an Opportunity to Enhance Security
Securing the Cloud: Making Cloud an Opportunity to Enhance Security February 2016 Greg Coughlin Director, IBM Security @JGCoughlin 1 The rise of Shadow IT? 2 Security reality we have all been compromised
More informationAddressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
More informationNEC Managed Security Services
NEC Managed Security Services www.necam.com/managedsecurity How do you know your company is protected? Are you keeping up with emerging threats? Are security incident investigations holding you back? Is
More information