continue to have difficulty with communications in the Arctic region.

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "continue to have difficulty with communications in the Arctic region."

Transcription

1 How do you see the role & importance of satellite communications in the fulfillment of the CG mission? SATCOM has been critical to timely and reliable communications in the maritime environment. Its role is likely to continue to grow. Are there specific communication requirements that are currently not being met? We continue to have difficulty with communications in the Arctic region. Who, within the CG should industry talk to about satellite communications & new capabilities & technologies? CG-761 is the Coast Guard s Command, Control and Communications sponsor. What is holding up the decision process of determining acts of war response to cyberattacks? This is not a question the USCG can answer. National Policy or Defense Related issues should be addressed to other parts of the government. Working in an environment of limited resources, what are the CG s top programs regarding funding? Within the CG Intelligence enterprise Information Technology is our top (by dollars assigned) program, with 37.6% of our O&M dollars; Technical Intelligence is second with 22.4% of our O&M funds. What programs, if any, are being impacted due to funding constraints? Within the CG Intelligence enterprise, our overall management and support staffing has been cut significantly over the past few fiscal years. Can you please provide more information on what you mean by counterintelligence within the acquisition process? CI support to RDA programs focuses on protecting critical technologies, and critical components; those technologies and functions deemed critical to the operational viability of the RDA program. CI support is from cradle to grave; it educates RDA personnel about the threats and collection methodologies directed against RDA programs and the supply chain, as well as how to detect and respond to foreign collection activity. Private industry often has broad capabilities and the ability to quickly adapt to the needs of most customers. Can you provide 2-3 specific ways that private industry partners can expect to support the efforts of CG intelligence either through people with specific skills or IT platforms? Contractors with skill sets in emerging intelligence capabilities would be in the best position to benefit (Cyber, IT, others) How do you see the role & importance of satellite communications in the fulfillment of the CG mission? SATCOM has been critical to timely and reliable communications in the maritime environment. Its role is likely to continue to grow. Are there specific communication requirements that are currently not being met? We continue to have difficulty with communications in the Arctic region.

2 Who, within the CG should industry talk to about satellite communications & new capabilities & technologies? CG-761 is the Coast Guard s Command, Control and Communications sponsor. What is holding up the decision process of determining acts of war response to cyberattacks? This is not a question the USCG can answer. National Policy or Defense Related issues should be addressed to other parts of the government. Has there been any consideration given to making use of more flexible/agile contracts? For example, to support specific missions, award contracts for 3-6 months to support specific tasks instead of awarding contracts for the traditional base and multiple option years. CG-28 supports the idea of shorter-term or flexible contracts. We have done level-ofeffort contracts which request a certain number of work hours within a specified calendar period (usually a year). Our Acquisition folks have tended to award annual contracts with option years simply to standardize things and make them more repeatable. Does the CG maintain a network infrastructure evaluation and test organization to validate systems capabilities before deployment? Since most systems utilized by CG are existing Navy or DoD Program of Record systems independent testing by CG isn t necessary. However, for new and unique systems CG does have the capability. Who is responsible for evaluation of firewalls, IPS/IDS? Is this a part of network infrastructure or a separate IA group? CG engineering staff would initially be responsible for network components, although validation is conducted by a separate IA organization. When will the CG undertake tech refresh on both afloat & ashore IT systems? It really depends on the system. Can CG use other DHS task orders or contracts & transfer funds to these task orders? The CG can and does use task orders on DHS contracts. We also often transfer funds to the Office of Selective Acquisitions for use on sensitive contracts. With the CG being the backside for homeland security in the maritime, will the OPC have the C4ISR to be able to work seamlessly in support of USN? The OPC will typically conduct its primary missions in the Coast Guard deepwater environment, beyond 12 nautical miles from shore, and will be deployed anywhere around the globe where the national interests require the Coast Guard s unique blend of authorities and capabilities. It will include a sophisticated C4ISR suite of sensors, displays, and communications equipment and will be equipped with combat weapons systems scaled to the expected threat environments. To maximize efficiency, the OPC will be interoperable with the USN and have the ability to exchange voice, data and video with DoD, DHS components, international partners, commercial and private vessels or aircraft.

3 You mention that workforce within the CIO organization requires more professional personnel; both enlisted & officers this also appears to be the case with the new assets (aircraft & NSCs) when will the personnel system catch up with policies such as assignments and pro-pay? The personnel system is working well; it is the resourcing system that is playing catch up. We have brought on capabilities and acquisitions without adequately resourcing them due to reduced budget. CG-DoD Industry technology sharing Can we do better so we don t pay more than once with a limited budget? For example, Navy systems may be overkill for CG application, can we do systems scalable to fit multiple services. Can CG define requirements more effectively? Yes, absolutely. There is always room for improvement when it comes to defining requirements & technology sharing. We have been working closely with N2N6 on this very issue specific to cryptologic systems. The current environment is ripe across C4ISR for finding cost-efficient ways to address various requirements via scalable systems. RDT&E funding streams across government, likewise, increasingly requires joint capability/meeting joint requirements in the earliest stages of the funding request process to gain any traction for support. Is the intel IT budget separate from the CG Non-intel budget? How much funding does the CG get from ODNI for your intel IT budget? Coast Guard Intelligence receives funding from both the IC and as part of its regular DHS appropriation. IT purchases are made with both sources of funds. The exact amounts of the IC funding as classified. IT program purchases consume 37.6% of our available O&M funds. Working in an environment of limited resources, what are the CG s top programs regarding funding? Within the CG Intelligence enterprise Information Technology is our top (by dollars assigned) program, with 37.6% of our O&M dollars; Technical Intelligence is second with 22.4% of our O&M funds. What programs, if any, are being impacted due to funding constraints? Within the CG Intelligence enterprise, our overall management and support staffing has been cut significantly over the past few fiscal years. Can you please provide more information on what you mean by counterintelligence within the acquisition process? CI support to RDA programs focuses on protecting critical technologies, and critical components; those technologies and functions deemed critical to the operational viability of the RDA program. CI support is from cradle to grave; it educates RDA personnel about the threats and collection methodologies

4 directed against RDA programs and the supply chain, as well as how to detect and respond to foreign collection activity. Will the CG follow the USN Information Dominance Corps model, i.e. integrating N2&N6 by integrating CG-2 & CG-6? At the Headquarters staff level, the Coast Guard will not be integrating our CG2 and CG6 staff. However, to support computer network defense, Protection of the Maritime Critical Infrastructure and Providing a Decision Advantage in Maritime Operations with Cyber Capabilities, moving operational function of CG-2 and CG-6 that currently occur in the policy and engineering staffs and placing them under a unified command at the operational layer of mission is being reviewed and expected to occur. C4ISR as capital program: USCYBERCOM (General Alexander) previously convinced the Joint Chiefs of Staff that transitioning existing C4ISR systems to Cloud- Computing architecture (JIE) will save some long term DoD funding while increasing cybersecurity posture. Will DHS & by extension the CG transition C4ISR systems to a similar cloud computing architecture? DHS is currently moving to Technology As A Service cloud architecture. For example Workplace As A Service, Share point As A Service, etc. The USCG is a military organization that is fully tied to the.mil networks. Additionally, in our operating environment, we rely on DOD sensors, information systems and training systems at all classification levels to provide our Intelligence Surveillance and Reconnaissance (ISR) needs in the Maritime. As such, we will be moving with DOD to the JIE Architecture. However, as a DHS component, there are likely elements of the As A Service solutions that the Coast Guard may use to ensure our reporting and information sharing with our department is firmly in place. How important is encryption for CG s cyber security? Encryption of our communication within our.mil network and when transiting between Other Government agencies at the Federal, State, Local, Territorial and Tribal levels is critical to Operational Security. Establishing a robust encryption capability, which minimizes our workforce remembering to encrypt data transmitted to other government entities, will significantly reduce our Privacy and Operational Security Information Spills. What is the CG doing to ensure the networks on its cutters are cyber secured- from both internal & external threats? The Coast Guard's Information Assurance programs for shipboard systems are certified and accredited using the same process as our shore side equipment. CG-65 is responsible for Unclassified and GENSER Classified, while CG-26 is responsible for SCI systems. Performing security updates to our electronics and computer systems on our cutters are the responsibility of our Base C4IT Divisions. They work with CGCYBER and the respective systems Product Line Manager within the C4ITSC and the Intelligence Coordination Center to ensure software updates/patches that can be deployed from a central site are correctly loaded and audit logs of those systems

5 are reviewed for threats. When central deployments cannot be performed, the Base C4IT Division coordinates the local installation. Shipboard systems that are on the network are monitored by our CGCYBER Security Operations Center (CSOC). When a security alert is triggered our Information Systems Security Officers at the Base C4IT Divisions coordinate with ship personnel to contain and when necessary eradicate the threat. What role can/should SIGINT play in Cyber? SIGINT provides a vital window for our nation into foreign adversaries' capabilities, actions, and intentions. This includes the ability to see the cyber battle space and gain insights into the opponent s use of cyber to inform cyber operations. It is precisely what led the joint world to align US Cyber Command with the SIGINT situational awareness and knowledge of the battlespace of NSA. How does the CG define Cyber? Where does the CG draw the boundaries of intersection between cyber & operations & cyber & policy? The Coast Guard is currently drafting these definitions for our CG Cyber Strategy and internal alignment of resources as discussed in question #20 above. What is the most significant challenge facing USCG Cyber Command in working with US Cyber Command & DHS NPPD Cyber Office? The Coast Guard must establish a single Cyber Watch Center that provide cyber situational awareness for the Maritime Domain. This means that all Computer Network Defense, Maritime Critical Infrastructure and Decision Advantage cyber activities across the electromagnetic spectrum must go through this center so that DHS NCCIC and DOD s USCYBERCOM watch centers. It seems as though most of the CG representation today is from the operational or HQ policy side of the CG. Could you please discuss the portals available to industry to engage with your acquisition directorate? Do they handle acquisition for CG SIGINT/Intel Programs? Certainly, we hear loud & clear that you d like more Acquisition (CG-9) representation at the next CG Intelligence Industry Day and we will work to get them involved. Regarding acquisitions of SIGINT equipment; the answer is it depends. Equipment that is part of the National Security Cutter was part of the construction contract, so CG-9 had a hand in acquiring that. Follow-on support and maintenance for that equipment may go through CG-9, or if the Statement of Work is sensitive, we may work through the DHS Office of Selective Acquisitions. What is holding up the United States from joining the international Arctic consortium group? Without more information, we are unfortunately unable to answer this question.

6 After extensive research and coordination, neither the Coast Guard (DCO-X and other offices with whom we work) nor our interagency partners has heard of the international Arctic consortium group or any other organization with a similar name. If the person posing this question could provide more details as to the actual name of this consortium or group, we could provide a more comprehensive answer. Of course, the primary international body dealing with the Arctic is the Arctic Council, consisting of the eight Arctic nations, various indigenous groups, non-governmental organizations, and an increasing number of permanent observer States. The United States has been a key member since the Ottawa Declaration in The United States has not joined the 1982 UN Convention on the Law of the Sea, which provides the governing principles for world's ocean and coastal waters, including the Arctic maritime regime. However, since President Reagan's ocean policy statement of March 1983, the United States has committed itself to following the non-seabed mining provisions of the Convention. Moreover, the United States signed the Ilulissat Declaration in May 2008, along with the four other States bordering the Arctic Ocean: Canada, Denmark (Greenland), Norway, and the Russian Federation. Among other things, that Declaration recognizes that "the law of the sea provides for important rights and obligations concerning the delineation of the outer limits of the continental shelf, the protection of the marine environment, including ice-covered areas, freedom of navigation, marine scientific research, and other uses of the sea. We remain committed to this legal framework and to the orderly settlement of any possible overlapping claims." The United States is also committed to the development of an Arctic Coast Guard Forum, mandatory rules to promote safe maritime activities in the Arctic under the auspices of the International Maritime Organization, and bilateral and multilateral agreements governing search and rescue, oil spill prevention and response, safety of vessels and aircraft operating in the Arctic, environmental protection, maritime boundary delimitation, marine scientific research, food security and cultural protection for the indigenous peoples of the Arctic, sustainable development, and other topics. Please describe the CG s approach to engaging small business, including its SB goals, progress toward meeting these goals and use of small business set asides. The Coast Guard realizes that small businesses are a vital part of our national strength. We are proud of our record for awarding Coast Guard contracts to small businesses and our record for meeting or exceeding annual socioeconomic goals. In 2013, the Coast Guard awarded nearly 34% of its procurement dollars to small businesses and exceeded agency goals for awards to Small Business, Small Disadvantaged Business, (8a) Small Disadvantaged Business, HUBZone contracts, and Service Disabled Veteran Owned Small Business. The Coast Guard awards contracts via Small Business Set-asides when market research indicates that the market meets the "rule of two" and via other competitive and limited

7 competition processes. The Coast Guard announces upcoming opportunities via the Acquisition Planning Forecast System. Each of the Coast Guard's six acquisition centers has a Small Business Specialist charged with engaging small businesses for market research, facilitating their participation in appropriate procurements, and answering procedural questions to enhance understanding of the procurement process. Moreover, the Coast Guard has a Small Business Specialist/Industry Liaison who oversees the Coast Guard's small business program. The Coast Guard s Head of the Contracting Activity closely monitors progress against annual small business and other socioeconomic goals and is a strong advocate of the small business program. For additional information about Coast Guard small business programs and points of contact, please visit the following website: CG becoming a model acquisition community is the CG establishing a civilian professional acquisition community commensurate with the USN civilian professional acquisition community, i.e. DAWIA certification? Yes, the U. S. Coast Guard (USCG) Acquisition Directorate s Human Capital Strategic Plan (HCSP) maps out a vision and direction for maintaining and continually developing a world-class acquisition workforce. The HCSP outlines current challenges, details strategies for addressing those challenges, and identifies specific courses of action to ensure that we have skilled and certified professionals available to perform the USCG s acquisition functions now and in the future. Both the USCG and Defense Acquisition Workforce Improvement Act (DAWIA) acquisition workforce share a community of practice and many similar characteristics. The USCG acquisition certification process is structured in alignment with the Department of Homeland Security (DHS) and closely mirrors DAWIA. Both DHS and DAWIA use certifications to determine that an employee meets the education, training, and experience standards required for a particular career field. USCG personnel can obtain certification in the following acquisition career fields through DHS: Contracting, Cost Estimating, Life Cycle Logistics, Program Financial Management, Program Manager, Systems Engineering, and Test and Evaluation. The Coast Guard uses DAWIA requirements for those career fields where no DHS certification exists: Facilities Engineering, Information Technology, Production, Quality and Manufacturing, and Requirements Management. Both DHS and DAWIA have a three tier competency level certification system (entry level I, mid level II, and senior level III) with requirements that have many common characteristics:

8 Training: To satisfy competencies through training, there are requisite hours and subjects that must be included in the curriculum. Some DHS and all Coast Guard certification training requirements can be met through the completion of Defense Acquisition University (DAU) courses. DAU courses, when specific DHS courses are not available, provide a common training resource. Experience: In general, the entry level requires a minimum of one year of relevant experience. The mid level and senior level certifications require two and four years of experience, respectively. Fulfillment: A common process of using experience, education, professional certification, or training to satisfy competency requirements. To accomplish the eye to eye contact you would like, what can industry and CG ops do to navigate the turbulent waters of the federal contracting offices? Quality Industry Engagement is a priority for the DHS Chief Procurement Officer and for the Coast Guard Head of Contracting Activity. The Coast Guard is proactively leaning forward to improve "eye to eye" contact to improve market research, refine requirements, and enhance competition, while maintaining a level playing field during procurements. Coast Guard customers should engage their cognizant contracting staff early to maximize the opportunities for industry engagement. In addition to standard vehicles, such as Requests for Information (RFI), contracting officers can organize capability presentations, one-onone meetings, and other meaningful, mutually productive sessions. The Coast Guard is planning multiple Industry Days across the contracting enterprise in the coming months; industry partners should actively participate in such events. Early planning and adherence to a few basic rules permits all parties to navigate the waters...it need not be turbulent! Please address your acquisition capabilities & trends. Basically, describe how you buy. Under the leadership of the Head of the Contracting Activity, Coast Guard procurements are executed by six Chiefs of Contracting and over 500 civilian and military members. Coast Guard acquisition professionals are certified, highly trained and motivated to maximize taxpayer value. The portfolio of supplies, services and major systems the Coast Guard acquires is broad, and it requires creativity and flexibility. The Coast Guard utilizes a broad array of procurement types, from purchase cards to formal source selection, to meet its operational needs and to support component and Departmental goals for competition, socioeconomic programs and other targets. In 2013, the Coast Guard obligated nearly 57 percent of its award dollars competitively and nearly 34 percent of its dollars to Small Businesses, while exceeding targets for awards to Small Disadvantaged Businesses, HUBZone awards and Service Disabled

9 Veteran Owned Small Businesses. The Coast Guard will continue to recapitalize its fleet and meet operational requirements via competitive procurements to the maximum extent practicable. The Coast Guard will also continue to focus on improved industry engagement and quality procurement planning via the Acquisition Planning Forecast System. Additionally, the Coast Guard will continue to provide timely feedback on contractor performance and utilize such information when conducting source selections to ensure that precious procurement funds are awarded to high performing companies.

To the Men and Women of the Coast Guard:

To the Men and Women of the Coast Guard: United States Coast Guard Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance & Information Technology (C4ISR&IT) Strategic Plan Fiscal Years 2015-2019 To the Men and

More information

COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS AND INFORMATION TECHNOLOGY (C4&IT) INFRASTRUCTURE MANAGEMENT POLICY

COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS AND INFORMATION TECHNOLOGY (C4&IT) INFRASTRUCTURE MANAGEMENT POLICY Commandant United States Coast Guard 2100 Second Street, S.W. Washington, DC 20593-0001 Staff Symbol: CG-6 Phone: (202) 267-2767 Fax: (202) 267-2598 COMDTINST 5230.70 FEB 11 2005 COMMANDANT INSTRUCTION

More information

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES. Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive

More information

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,

More information

Coast Guard Top Acquisition Priorities and the Interoperability Imperative

Coast Guard Top Acquisition Priorities and the Interoperability Imperative Coast Guard Top Acquisition Priorities and the Interoperability Imperative CG 9 Capt Joe Vojvodich, C4ISR Acquisition Program Mgr ComDef West 2010 01 February 2010 Advancing Force Multiplicity Coast Guard

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

Intelligence Officer Career Guide

Intelligence Officer Career Guide UNITED STATES COAST GUARD Intelligence Officer Career Guide Active Duty LTJG CAPT Table of Contents The General Development of an Officer... 3 Building the Intelligence Officer... 3 1. Training... 4 2.

More information

The Nationwide Automatic Identification System Newsletter Issue #1 3 rd Quarter FY 2007

The Nationwide Automatic Identification System Newsletter Issue #1 3 rd Quarter FY 2007 June 2007 Issue 1 The Nationwide Automatic Identification System Newsletter Issue #1 3 rd Quarter FY 2007 W elcome to the first issue of The Guardian, a quarterly newsletter issued by the Nationwide Automatic

More information

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength Enterprise IT Aligning Strong Solutions, Assuring Enterprise Strength Strategic planning aligns your enterprise IT infrastructure with your mission, operational and efficiency goals. From the start, we

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) References: See Enclosure

More information

Flexible, Life-Cycle Support for Unique Mission Requirements

Flexible, Life-Cycle Support for Unique Mission Requirements Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics

More information

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT) Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:

More information

Rapid Response, Total Support. Homeland Security Solutions that Keep America Safe

Rapid Response, Total Support. Homeland Security Solutions that Keep America Safe Rapid Response, Total Support Homeland Security Solutions that Keep America Safe Solutions on the Front Lines of Homeland Security For the homeland security community, there are no second chances. Critical

More information

CANADA AND THE NORTH INSUFFICIENT SECURITY RESOURCES THEN AND NOW

CANADA AND THE NORTH INSUFFICIENT SECURITY RESOURCES THEN AND NOW CANADA AND THE NORTH INSUFFICIENT SECURITY RESOURCES THEN AND NOW Prepared by: Colonel (Retired) Pierre Leblanc 9 August 2011 BACKGROUND In the late 1990 s I was the Commander of the Canadian Forces in

More information

Forecast to Industry 2015

Forecast to Industry 2015 Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:

More information

The Computing Technology Industry Association. The State of Federal Information Security. Committee on Oversight and Government Reform

The Computing Technology Industry Association. The State of Federal Information Security. Committee on Oversight and Government Reform The Computing Technology Industry Association The State of Federal Information Security Committee on Oversight and Government Reform Subcommittee on Government Management, Organization, and Procurement

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive

More information

Department of Homeland Security Office of Inspector General

Department of Homeland Security Office of Inspector General Department of Homeland Security Office of Inspector General Coast Guard Has Taken Steps To Strengthen Information Technology Management, but Challenges Remain OIG-11-108 September 2011 Office of Inspector

More information

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT Northrop Grumman Corporation Trusted, Innovative, World-Class Supply Chain INTERVIEWS Kevin Engfer Director, Supplier Mission Assurance, Northrop Grumman

More information

NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN

NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN 2013-2018 2 NAVAL SEA SYSTEMS COMMAND Foreword Everything the United States Navy brings to the fight, and ultimately does for the nation, is delivered

More information

Statement of. Vice Admiral William A. Brown, United States Navy. Deputy Commander, United States Transportation Command

Statement of. Vice Admiral William A. Brown, United States Navy. Deputy Commander, United States Transportation Command Statement of Vice Admiral William A. Brown, United States Navy Deputy Commander, United States Transportation Command Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5144.02 November 21, 2014 DCMO SUBJECT: DoD Chief Information Officer (DoD CIO) References: See Enclosure 1. PURPOSE. Under the authority vested in the Secretary

More information

COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS AND INFORMATION TECHNOLOGY (C4&IT) ENTERPRISE ARCHITECTURE (EA) POLICY

COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS AND INFORMATION TECHNOLOGY (C4&IT) ENTERPRISE ARCHITECTURE (EA) POLICY Commandant United States Coast Guard 2100 Second Street, S.W. Washington, DC 20593-0001 Staff Symbol: CG-6 Phone: (202) 267-2767 Fax: (202) 267-2598 COMDTINST 5230.68 AUG 30, 2004 COMMANDANT INSTRUCTION

More information

Department of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process

Department of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process Department of Homeland Security Office of Inspector General Review of U.S. Coast Guard Enterprise Architecture Implementation Process OIG-09-93 July 2009 Contents/Abbreviations Executive Summary...1 Background...2

More information

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations

More information

The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter

The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter 1. In what ways do private entities currently share with, and receive from, the government cyber threat information?

More information

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 I. Defense Cooperation and the Aim of the Guidelines In order to ensure Japan s peace and security under any circumstances, from peacetime

More information

Marine Corps. Commercial Mobile Device Strategy

Marine Corps. Commercial Mobile Device Strategy Marine Corps Commercial Mobile Device Strategy April 2013 THIS PAGE INTENTIONALLY LEFT BLANK FOREWORD The currently constrained budget environment requires us to balance fiscal responsibility and mission

More information

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 14-6 UNITED STATES TRANSPORTATION COMMAND 5 FEBRUARY 2015

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 14-6 UNITED STATES TRANSPORTATION COMMAND 5 FEBRUARY 2015 BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 14-6 UNITED STATES TRANSPORTATION COMMAND 5 FEBRUARY 2015 Intelligence INTELLIGENCE SUPPORT TO FORCE PROTECTION COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

More information

Network Systems Integration

Network Systems Integration Network Systems Integration Strong Networks for Mission-Critical Services Turnkey Solutions for Today s Large-Scale Networks Government and business enterprises turn to General Dynamics Information Technology

More information

September 24, 2015. Mr. Hogan and Ms. Newton:

September 24, 2015. Mr. Hogan and Ms. Newton: Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930

More information

U.S. Coast Guard Command, Control, Communication, Computers, Intelligence, Surveillance, and Reconnaissance Modernization

U.S. Coast Guard Command, Control, Communication, Computers, Intelligence, Surveillance, and Reconnaissance Modernization U.S. Coast Guard Command, Control, Communication, Computers, Intelligence, Surveillance, and Reconnaissance Modernization October 28, 2014 OIG-15-05 HIGHLIGHTS U.S. Coast Guard Command, Control, Communication,

More information

MISSION, FUNCTIONS AND TASKS OF NAVAL AIRSPACE AND AIR TRAFFIC CONTROL STANDARD AND EVALUATION AGENCY

MISSION, FUNCTIONS AND TASKS OF NAVAL AIRSPACE AND AIR TRAFFIC CONTROL STANDARD AND EVALUATION AGENCY DEPARTMENT OF THE NAVY 0PPICB OP THE CRIIP OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 5450.351 N98 OPNAV INSTRUCTION 5450.351 From: Subj: Chief of Naval Operations MISSION,

More information

DEPARTMENT OF HOMELAND SECURITY

DEPARTMENT OF HOMELAND SECURITY DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $43.2 billion, an increase of $309 million above the 2010 enacted level. Increases were made in core homeland security functions such as border

More information

How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives

How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR

More information

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,

More information

PMW-205 Naval Enterprise Networks (NEN) Closing Brief and Summary Remarks

PMW-205 Naval Enterprise Networks (NEN) Closing Brief and Summary Remarks PMW-205 Naval Enterprise Networks (NEN) Closing Brief and Summary Remarks CAPT Michael Abreu Program Manager Naval Enterprise Networks (PMW-205) 17 November 2015 DoN Acquisition Org Excerpt Chief of Naval

More information

D E PAR TME NT OF THE NAVY OFFICE OF THE SECR ET A R Y 1000 N A VY PENT A G ON W A SHI N G T ON D C 20350-1000

D E PAR TME NT OF THE NAVY OFFICE OF THE SECR ET A R Y 1000 N A VY PENT A G ON W A SHI N G T ON D C 20350-1000 D E PAR TME NT OF THE NAVY OFFICE OF THE SECR ET A R Y 1000 N A VY PENT A G ON W A SHI N G T ON D C 20350-1000 SECNAVINST 5430.27D OJAG (Code 13) SECNAV INSTRUCTION 5430.27D From: Secretary of the Navy

More information

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)

More information

United States Coast Guard Cyber Command. Achieving Cyber Security Together. Homeland Security

United States Coast Guard Cyber Command. Achieving Cyber Security Together. Homeland Security United States Coast Guard Cyber Command Achieving Cyber Together Brett Rouzer Chief of MCIKR Protection U.S. Coast Guard Cyber Command DHS NCCIC Liaison Officer (202) 372-3113 Brett.R.Rouzer@uscg.mil Vision

More information

International cooperation in defense acquisition programs is an important but complex undertaking.

International cooperation in defense acquisition programs is an important but complex undertaking. H U M A N C A P I T A L I N I T I A T I V E S New Career Path Recognizes Global Scope of Acquisitions International Acquisition Career Path Duane Tripp Roy Wood International cooperation in defense acquisition

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3115.10E March 24, 2006 USD(I) SUBJECT: Intelligence Support to Personnel Recovery References: (a) Title 10, United States Code (b) Title 50, United States Code

More information

Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING

Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING SECNAV INSTRUCTION 1543.2 From: Secretary of the Navy SECNAVINST 1543.2 DON CIO Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING Ref: See Enclosure (1) Encl: (1) References (2) Responsibilities

More information

Law on Coast Guard. Art 1 Purpose. The purpose of this law is to reestablish a Coast Guard for Somalia. Art 2 Definitions

Law on Coast Guard. Art 1 Purpose. The purpose of this law is to reestablish a Coast Guard for Somalia. Art 2 Definitions Law No------/2015 Law on Coast Guard Art 1 Purpose The purpose of this law is to reestablish a Coast Guard for Somalia. For the purpose of this Law:. means. Art 2 Definitions Art 3 Applicability of Somali

More information

INTELLIGENCE AND HOMELAND DEFENSE INSIGHT

INTELLIGENCE AND HOMELAND DEFENSE INSIGHT I N D U S T R Y INTELLIGENCE AND HOMELAND DEFENSE INSIGHT INTELLIGENCE AND HOMELAND DEFENSE CHALLENGES The Intelligence Community (IC) needs the right information, in real time, to make critical decisions.

More information

DOD BUSINESS SYSTEMS MODERNIZATION. Additional Action Needed to Achieve Intended Outcomes

DOD BUSINESS SYSTEMS MODERNIZATION. Additional Action Needed to Achieve Intended Outcomes United States Government Accountability Office Report to Congressional Committees July 2015 DOD BUSINESS SYSTEMS MODERNIZATION Additional Action Needed to Achieve Intended Outcomes GAO-15-627 July 2015

More information

Integrated C4isr and Cyber Solutions

Integrated C4isr and Cyber Solutions Integrated C4isr and Cyber Solutions When Performance Matters L-3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a

More information

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:

More information

Reliable, Repeatable, Measurable, Affordable

Reliable, Repeatable, Measurable, Affordable Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you

More information

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality

More information

OPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014

OPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014 DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3000.15A USFF/CNO N3/N5 OPNAV INSTRUCTION 3000.15A From: Chief of Naval Operations

More information

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350-1000 SECNAVINST 5510.36A N09N2 SECNAV INSTRUCTION 5510.36A From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY

More information

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information

More information

Chapter6 Nuclear Command and Control System

Chapter6 Nuclear Command and Control System Chapter6 Nuclear Command and Control System 6.1 Overview The U.S. Nuclear Command and Control System (NCCS) relies on a collection of activities, processes, and procedures performed by appropriate military

More information

(1) Acquisition Professional of the Year. (3) Major Acquisition Activity Award. (4) Field Acquisition Activity Award

(1) Acquisition Professional of the Year. (3) Major Acquisition Activity Award. (4) Field Acquisition Activity Award a. Non-Monetary Awards. All individual award recipients will receive a plaque. Winning activities will receive a plaque and/or other suitable award for appropriate display at the respective command. The

More information

Final reports on deepened defence cooperation between Finland and Sweden

Final reports on deepened defence cooperation between Finland and Sweden Final reports on deepened defence cooperation between Finland and Sweden Report by the Finnish Defence Forces and the Swedish Armed Forces 1 Background In this joint final report the Finnish Defence Forces

More information

Department of Defense DIRECTIVE. SUBJECT: The National Security Agency and the Central Security Service

Department of Defense DIRECTIVE. SUBJECT: The National Security Agency and the Central Security Service Department of Defense DIRECTIVE NUMBER 5100.20 December 23, 1971 Incorporating Through Change 4, June 24, 1991 SUBJECT: The National Security Agency and the Central Security Service ASD(I) Reference: (a)

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8000.01 March 17, 2016 DoD CIO SUBJECT: Management of the Department of Defense Information Enterprise (DoD IE) References: See Enclosure 1 1. PURPOSE. This directive:

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8115.01 October 10, 2005 ASD(NII)/DoD CIO SUBJECT: Information Technology Portfolio Management References: (a) Subtitle III of title 40, United States Code (formerly

More information

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 9410.5C N2/N6 OPNAV INSTRUCTION 9410.5C From: Chief of Naval Operations Subj: NAVY

More information

v Department of Defense INSTRUCTION SUBJECT: Countering Espionage, International Terrorism, and the Counterintelligence (CI) Insider Threat

v Department of Defense INSTRUCTION SUBJECT: Countering Espionage, International Terrorism, and the Counterintelligence (CI) Insider Threat v Department of Defense INSTRUCTION NUMBER 5240.26 May 4, 2012 Incorporating Change 1, Effective October 15, 2013 SUBJECT: Countering Espionage, International Terrorism, and the Counterintelligence (CI)

More information

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012 (U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events

More information

One Hundred Twelfth Congress of the United States of America

One Hundred Twelfth Congress of the United States of America S. 3454 One Hundred Twelfth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the third day of January, two thousand and twelve An Act

More information

DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000

DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 5000 Ser NOO / )00063 21 May 10 MEMORANDUM FOR DISTRIBUTION From: Subj: Ref: Encl: Chief of Naval Operations

More information

U.S. Coast Guard. America s Maritime Guardian

U.S. Coast Guard. America s Maritime Guardian U.S. Coast Guard America s Maritime Guardian Nov. 2009 A few armed vessels, judiciously stationed at the entrances of our ports, might at a small expense be made useful sentinels of the laws. Alexander

More information

This directive establishes the Department of Homeland Security (DHS) Security Education, Training, and Awareness (SETA) Program.

This directive establishes the Department of Homeland Security (DHS) Security Education, Training, and Awareness (SETA) Program. Department of Homeland Security Management Directive System MD Number: 11053 Issue Date: 10/12/2004 SECURITY EDUCATION, TRAINING, AND AWARENESS PROGRAM DIRECTIVE 1. Purpose This directive establishes the

More information

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate

More information

Cybersecurity Delivering Confidence in the Cyber Domain

Cybersecurity Delivering Confidence in the Cyber Domain Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation

More information

Emergency Support Function #9 Search and Rescue Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

Emergency Support Function #9 Search and Rescue Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies: ESF Coordinator: Homeland Security/ Federal Emergency Management Agency Primary Agencies: Homeland Security/ Federal Emergency Management Agency Homeland Security/ U.S. Coast Guard the Interior/National

More information

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks June 2011 Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

More information

FACT SHEET. General Information about the Defense Contract Management Agency

FACT SHEET. General Information about the Defense Contract Management Agency FACT SHEET General Information about the Defense Contract Management Agency Mission: We are the independent eyes and ears of DoD and its partners, delivering actionable acquisition insight from the factory

More information

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING BACKGROUNDER Point of Contact: Mr. James L. Lindsey (703) 704-0194 James.L.Lindsey8.civ@mail.mil PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING Product Director, Enterprise Content,

More information

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 3305.09 May 27, 2014 USD(I) SUBJECT: Cryptologic Accreditation and Certification References: See Enclosure 1 1. PURPOSE. This manual: a. Provides accreditation guidance

More information

Advancing the U.S. Air Force Mission

Advancing the U.S. Air Force Mission Advancing the U.S. Air Force Mission IT Solutions, Professional & Technical Services Agile Support for Today s Operations, Reliable Innovation for Tomorrow s Missions An F-22 in Nevada returns to the

More information

Operation IMPACT (Injured Military Pursuing Assisted Career Transition)

Operation IMPACT (Injured Military Pursuing Assisted Career Transition) Operation IMPACT (Injured Military Pursuing Assisted Career Transition) January 2013 Operation IMPACT Program Management Office Northrop Grumman Today Leading global security company providing innovative

More information

April 15, 2015. Re: Docket Number USCG-2014-1020. Dear Captain Tucci,

April 15, 2015. Re: Docket Number USCG-2014-1020. Dear Captain Tucci, April 15, 2015 Captain Andrew Tucci Chief, Office of Port & Facility Compliance, U.S. Coast Guard U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200 New Jersey Avenue SE

More information

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports 2005 SRI International SRI International Company Proprietary Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports Presented to: 10 th Annual Harbor Safety

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION SUBJECT: National Defense Intelligence College University (NDIC NIU) NUMBER 3305.01 December 22, 2006 Incorporating Change 1, February 9, 2011 USD(I) References: (a) DoD

More information

Cyber Security: Defending Your Enterprise

Cyber Security: Defending Your Enterprise Cyber Security: Defending Your Enterprise www.gdit.com/cyber RELIABLE, REPEATABLE MEASURABLE, AFFORDABLE The Threat Spectrum Outsider Threats Terrorists, theft, spies, hackers, foreign governments, denial

More information

HOMELAND SECURITY ACQUISITIONS

HOMELAND SECURITY ACQUISITIONS United States Government Accountability Office Report to Congressional Requesters April 2015 HOMELAND SECURITY ACQUISITIONS Major Program Assessments Reveal Actions Needed to Improve Accountability GAO-15-171SP

More information

DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE

DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3115.12 August 24, 2010 USD(I) SUBJECT: Open Source Intelligence (OSINT) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes policy, assigns

More information

DEFENSE BUSINESS SYSTEMS. Further Refinements Needed to Guide the Investment Management Process

DEFENSE BUSINESS SYSTEMS. Further Refinements Needed to Guide the Investment Management Process United States Government Accountability Office Report to Congressional Committees May 2014 DEFENSE BUSINESS SYSTEMS Further Refinements Needed to Guide the Investment Management Process GAO-14-486 May

More information

How To Do Business With Northrop Grumman

How To Do Business With Northrop Grumman How To Do Business With Northrop Grumman November 9, 2011 Tizoc S. Loza Corporate Program Manager SEBP / Government Relations HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY

More information

Coordinated Operation Capability Using Scalable C2

Coordinated Operation Capability Using Scalable C2 Coordinated Operation Capability Using Scalable C2 Authors: Hüseyin KUTLUCA, İbrahim AKSU, Arda ÜNAL MilSOFT Yazılım Teknolojileri A.Ş. Teknokent, 06800 ODTU Ankara / TURKEY hkutluca@milsoft.com.tr iaksu@milsoft.com.tr

More information

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3305.09 June 13, 2013 USD(I) SUBJECT: DoD Cryptologic Training References: See Enclosure 1 1. PURPOSE. In accordance with the authority in DoD Directive 5143.01

More information

Information Systems. April 2015

Information Systems. April 2015 Northrop Grumman Information Systems April 2015 Forward-Looking Statements This presentation contains statements, other than statements of historical fact, that constitute forward-looking statements within

More information

Department of Defense INSTRUCTION. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI)

Department of Defense INSTRUCTION. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI) Department of Defense INSTRUCTION NUMBER 5200.01 April 21, 2016 USD(I) SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI) References: See Enclosure 1

More information

Subj: NAVAL POSTGRADUATE SCHOOL MISSION AND FUNCTIONS

Subj: NAVAL POSTGRADUATE SCHOOL MISSION AND FUNCTIONS DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 5450.210D NPS OPNAV INSTRUCTION 5450.210D From: Chief of Naval Operations Subj: NAVAL

More information

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information