Welcome. Very Respectfully, Grant Schneider Deputy Director for Information Management and Chief Information Officer Defense Intelligence Agency

Size: px
Start display at page:

Download "Welcome. Very Respectfully, Grant Schneider Deputy Director for Information Management and Chief Information Officer Defense Intelligence Agency"

Transcription

1

2 Welcome Welcome to the 2012 Department of Defense Intelligence Information Systems (DoDIIS) Worldwide Conference in Denver, Colorado! We are privileged to hold this year s conference in such a vibrant area, rich with a large government and military presence connecting to and reminding us of our work to serve the warfighter. The theme of this year s conference is Advancing Mission Integration. Across the Intelligence Community (IC) and the Department of Defense (DoD), opportunities for integration are prevalent. This year, IC agencies are integrating to deliver a community Common Operating Environment and Information Technology (IT) Efficiency Strategy. As an IT community, we are seeking new and innovative ways to unify and standardize our infrastructure. Additionally, mission integration is the focus across the Defense Intelligence Agency (DIA). DIA directorates are working together to achieve the agency s ultimate goal of providing all-source defense intelligence to prevent strategic surprise and deliver a decision advantage to warfighters, defense planners, and policymakers. DIA has come together under the theme of One Mission. One Team. One Agency to effectively and efficiently advance our core mission capabilities. The DoDIIS conference is a rare opportunity for a diverse audience to come together in an open forum. I hope you will use this premier technology event as an opportunity to connect with people from government, military, industry, and academia, to share innovative solutions and emerging technologies. As you peruse the exhibit hall, listen to plenary speakers, and engage in breakout sessions, I encourage you to discuss ways to advance technology in the IC and DoD together. It is also important for you to attend the conference s evening events to engage in a free-flowing exchange of ideas and network with colleagues. Thank you for your continued support and participation in this year s DoDIIS Worldwide Conference. Your contribution is what makes this conference a success. I look forward to a productive and engaging week and I hope you enjoy your time in Denver. Very Respectfully, Grant Schneider Deputy Director for Information Management and Chief Information Officer Defense Intelligence Agency 1

3 People First. Mission Always. Minds Without Limits. redarchsolutions.com Tactical and Strategic Intelligence, System and Software Engineering Solutions

4 Table of Contents General Information and Conference Highlights General Information 4 Convention Center Map 5 Conference Highlights 6 CONFERENCE AGENDA AND SESSION DETAILS Conference Agenda 9 Breakout Session Details 16 FEATURED SPEAKERS Featured Speakers 31 DIA DS Seniors 41 NETWORKING EVENTS AND HOSTED BREAKS Hosted Breaks 43 Sheraton Floorplan 44 Networking Events 45 Conference Patrons 46 EXHIBIT HALL Products and Services by Category 49 Exhibit Hall Map 56 Exhibitor Directory 58 Exhibitor Profiles 60 3

5 General Information Conference Badge For security reasons, please wear your conference badge at all times. You will not be permitted to enter sessions or the Exhibit Hall without it. Please remember to remove your conference badge when leaving the Colorado Convention Center. Lead Retrieval Exhibitors were given the opportunity to rent lead retrieval units that use barcode technology to capture basic contact information (name, organization, address, phone, ) from attendee badges. Exhibitors have been instructed to ask permission prior to scanning badges. If you have any questions about how the lead retrieval system works, please visit Attendee Registration. Message Center If you need to receive telephone messages during the conference, please direct calls to the Attendee Registration at Messages will be posted on the bulletin board located next to Attendee Registration. Coffee/Light Refreshments Coffee and light refreshments will be served in the Exhibit Hall during the conference break periods. Additionally, many of the exhibiting companies will be serving complimentary snacks during breaks at their booths. Please check the Hosted Breaks section, page 43 of the conference program for more details. Technology Exposition The Exhibit Hall, located in Exhibit Hall D E on the Upper Level, features innovative products, solutions, and government offerings. Time has been allotted throughout the conference to allow you to visit the exhibits and enjoy complimentary snack breaks for your convenience. Additionally, seating for networking opportunities can be found in the lounges located throughout the Exhibit Hall. Exhibit Hall hours: Sunday Monday Tuesday Wednesday Photography/Videography During regular conference hours, there will be a professional photographer and videographer capturing images from the conference. If you do not wish to be photographed, please visit Attendee Registration. Payments If you need to settle your registration fee or would like a hard copy of your receipt, please visit Attendee Registration. Receipts will be ed to all attendees following the conference. Questions or Concerns If you have any questions or concerns at any time during the conference, please do not hesitate to speak an NCSI representative. Meeting Rooms Sidebar meeting rooms are available for government attendees to use in one-hour increments during the conference. To reserve a meeting room, please visit Attendee Registration Sterrett Place, Suite 200 Columbia, Maryland

6 Convention Center Map CHAMPA STREET Restrooms Restrooms Restrooms LOBBY Terrace Restrooms EXHIBIT HALL D LOBBY Offices Above C Restrooms Restrooms Offices Above A Offices Above F Terrace SPEER BOULEVARD (MOUNTAIN VIEW) LOBBY EXHIBIT HALL C EXHIBIT HALL E EXHIBIT HALL B EXHIBIT HALL F EXHIBIT HALL A Upper Level LOBBY Restrooms Restrooms Restrooms Restrooms Concessions Stairwell WELTON STREET STOUT STREET Light Rail Station Restrooms 507 Restrooms 407 West Shuttle Drop-off T ick et Office Restrooms Mile High Ballroom 1 through Restrooms North Shuttle Drop-off Office SPEER BOULEVARD (MOUNTAIN VIEW) WELLS FARGO THEATRE LOBBY Restrooms Restrooms D LOBBY C LOBBY Restrooms Gift Shop Ballroom Pre-Function Four Seasons Ballroom 1 through 4 Ballroom Pre-Function Cafe Business Center 301 Restrooms Offices R es trooms Information Center F LOBBY A LOBBY 14TH STREET (CITY VIEW) Street Level B LOBBY Restrooms Restrooms Shuttle Drop-off Shuttle Drop-off WELTON STREET 5

7 Smart People. Smarter Solutions. Conference Highlights Registration Mixer Join us on Sunday from in the Exhibit Hall, located in Exhibit Hall D E, for a night to network and catch up with colleagues. This will be your first opportunity to get a look at the Exhibit Hall, including over 60 new participating companies! The Registration Mixer is hosted by CACI. Cyber Café Stay connected while away from the office by taking advantage of the Cyber Café! Computers, internet access, and a printer have been provided in the Exhibit Hall at booth # 263, compliments of Microsoft. DoDIIS Daily News With a full agenda, it will be important to stay up-to-date! Every morning attendees will receive an containing session changes, conference updates, and other reminders. This information will also be available for pick up near the Wells Fargo Theatre. The DoDIIS Daily News is brought to you by: Exhibit Hall Dashboard Browse the Exhibit Hall for your chance to win a prize! With your conference materials, you received an Exhibit Hall Dashboard. To be eligible to win, simply have a representative from each participating booth stamp their app on your dashboard. Once you have collected all of the stamps, bring your dashboard to the NCSI Social Lodge, located at booth # 541 in the Exhibit Hall. An NCSI representative will check your dashboard and enter you into a raffle. Drawings will be held at the NCSI Social Lodge during every break on Tuesday and Wednesday. You do not have to be present to win. Winners will be posted on the Message Board next to Attendee Registration and will be listed in the DoDIIS Daily News DoDIIS Worldwide Conference Booth # 812 Booth # 228 Booth # 257 Booth # 122 Booth # 125 Exhibit Hall Dashboard Booth # 415 Booth # 200 Booth # 811 Booth # 1012 Booth # 800 Booth # 816 Booth # 817 Booth # 433 Social Lodge You re invited to STAY SOCIAL at NCSI s Media Lounge, located in booth # 541. Explore the ins & outs of social media, get cozy with a warm beverage by the fire, and enjoy socializing with others! Stay Social Twitter The official conference hashtag is #DoDIIS12. We encourage all attendees and exhibitors to use this for collaborative social media communications. Plenary Session Questions Enjoying a Plenary speaker but shy about asking questions? or tweet your questions and they will be asked for you! Send to DoDIISWW@dodiis.mil or send a tweet #DoDIIS12. 6

8 Conference Highlights Booth Awards It takes a lot of thought and effort to create an engaging booth for the Exhibit Hall. To recognize the dedication of our exhibitors, NCSI will present awards to the best booths in four categories: Best Showcase of Technology, Best New Exhibitor, Best Government Booth and People s Choice. To vote for the 2012 People s Choice award visit or simply follow us on and take our quick poll. Have a smartphone ready? Scan the QR code and vote directly! Voting is also available at the NCSI Social Lodge, booth # 541. Voting closes at 1330 on Tuesday, 3 April. Winners will be announced during Plenary Session on Wednesday morning and featured in the Wednesday edition of the DoDIIS Daily News. Defense Intelligence VSAT Network Program (DIVN) The DIA Defense Intelligence VSAT Network (DIVN) Program will provide satellite communication services for the 2012 DoDIIS Worldwide Conference. The Director and CIO remarks, as well as all guest speakers and Plenary Sessions will be made available, real-time, to DIA personnel and Joint Intelligence Community members worldwide. The DIVN team will also perform demonstrations of its capabilities in the areas of video teleconferencing, broadband data throughput, and Voice-over-IP (VoIP) telephony - all of which showcases the Demand Assigned Multiple Access (DAMA) communication technology enabling the DIVN program s ability to support the Intelligence Community customers secure data, voice, and video requirements globally. DIVN Advancing Mission Integration at the Speed of Light to the Tactical Edge Today! The DIVN team can be found in booth # 963. NCSI All-Hands Networking Social Want to hear some good music and have a great time networking with fellow attendees and exhibitors? Then you don t want to miss the All-Hands Networking Social, hosted by General Dynamics and Red Arch! Join us on Monday, from at the Sheraton Denver Downtown. All attendees received a ticket with their registration materials. Extra tickets can be purchased for $20 at the Attendee Registration desk. The All-Hands Networking Social is hosted by: DoDIIS WW Denver CO All-Hands Networking Social Hosted by: Monday 2 April Sheraton Denver Downtown Grand Ballroom All-Hands Networking Social Hosted by: Monday 2 April DoDIIS WW Denver CO Sheraton Denver Downtown Grand Ballroom DoDIIS WW Denver CO 1 Drink 1 Drink DoDIIS WW Denver CO 1 Drink 1 Drink Compliments of Compliments of Compliments of Compliments of DIA Small Business Office Stop by and visit the DIA Small Business Office located in the Exhibit Hall Lounge, booth # 861. DIA Booth Have you ever wondered how IT applications and capabilities work together to prevent a potential threat by creating intelligence? Visit the Defense Intelligence Agency (DIA) at booth # 233 for the opportunity to walk through five showcased applications as they take a deploying unit through the intelligence cycle. Participants are invited to walk through each step of the intelligence cycle and see how DIA and its partners across the Intelligence Community and Department of Defense work together to better prepare and inform warfighters and policymakers of potential threats and danger. 7

9 Conference Highlights

10 Conference agenda Sunday, 1 April Room Government Town Hall (Civilian & Military) Mr. Roy I. Apseloff Vice Deputy Director for Information Management and Deputy Chief Information Officer, Defense Intelligence Agency Government (civilian and military) IT personnel in GDIP funded billets attending the 2012 DoDIIS Worldwide Conference are strongly encouraged to attend the town hall meeting. 9

11 Conference agenda Monday, 2 April Wells Fargo Theatre Morning Announcements Mr. Roy I. Apseloff Vice Deputy Director for Information Management and Deputy Chief Information Officer, Defense Intelligence Agency Opening Remarks Mr. Grant M. Schneider Deputy Director for Information Management and Chief Information Officer, Defense Intelligence Agency Keynote Lieutenant General Ronald L. Burgess, Jr. Director, Defense Intelligence Agency The Army s Network Lieutenant General Susan S. Lawrence Chief Information Officer, G-6, U.S. Army Briefing addresses the importance of a single Joint network to successfully execute the Army s missions for unified land operations and the Title 10 responsibilities; Army s IT challenges; IT Management Reform; network portfolio management; and ongoing efforts Technology Exposition / Networking Break IT Enabling Advanced Defense Intelligence Analysis Mr. Jeffrey N. Rapp Deputy Director for Analysis, Defense Intelligence Agency In an increasingly information dominated environment, information technology is a critical enabler in the production of timely, relevant all-source defense intelligence. Advancing mission integration across the defense intelligence enterprise through innovative approaches ensures our analysts benefit from key capabilities necessary to provide customers the highest quality defense intelligence. The Art of Engagement: Inspiring People, Creating Change, and Making a Difference Mr. Rich Berens President and Chief Client Fanatic, Root Learning Organizations have a lot invested when they are embarking on new strategies and initiatives and most of those initiatives fail because it requires changes to an organization s culture or people. Leaders spend a lot of time perfecting a strategy, but not nearly enough time planning its execution to ensure it will be a success. In this session, Rich Berens, president at Root, explores how organizations can better inspire people and create change to make a difference. He ll identify the canyons that exist in organizations that typically lead to disconnects and ineffective execution at the leader, manager and individual contributor level, as well as the consequences and costs of having a disengaged workforce. This session will outline how leaders can get people engaged by creating a more meaningful connection between the strategy and an individual s role in that strategy by using visualization and systems-view thinking to engage both the heart and minds of people. Cloud Security: Opportunities and Challenges Mr. John Pescatore Vice President and Distinguished Analyst, Gartner, Inc. Lack of security has been a major inhibitor to the use of public cloud computing services, but cloud computing also provides an opportunity for more effective and efficient delivery of security services. This presentation will detail the issues and demonstrate typical cloud security deployment scenarios for a range of enterprise use cases Technology Exposition / Networking Break / Lunch 10

12 Conference agenda Monday, 2 April BREAKOUT SESSIONS Room # How DI2E Works With DoDIIS JWICS Connection Approval Process (JCAP) DoDIIS Software Licensing Process and New Policy Solutions for the Information Technology Enterprise - STORMs Update and Demo Strategy and Technical Roadmaps Evolving DoDIIS IT Services Intelligence Community Applications Mall - Aligning Mission Capability Delivery DCGS Data Framework and Data Sharing Across the IC and C2 Communities DoDIIS Enterprise Content Management System (econtent) No Names Left Behind: Better and Faster Arabic, Pashto, and Dari Name Translation A JARM View of DI2E and Data Cloud Frameworks Cloud; The Magic and Myth (PaaS, IaaS, SaaS, Engineered Solutions, MLS) Technology Exposition / Networking Break ( ) COCOM JIOC Challenges and Initiatives ( ) Solutions for the Information Technology Enterprise - COR Sessions to Implement Policy Knowledge Management's (KM) New Role in Setting the Benchmark for the Customer - IT Relationship Towards Advancing Mission Integration Distributed Common Ground System-Army (DCGS-A) Standard Cloud (DSC) Survey of Wireless & Mobility Architectures for Communication and Collaboration Large Data Ingestion and Cloud Computing (FMV and Imagery) System Security Engineering Advanced Persistent Threat Cross Domain Products and Technologies Content Discovery and Retrieval Specifications for Composable, Secure Services ICD 503 IC Computer Network Defense - ICD 502 & Integrated Defense of the IC Information Environment UCDMO: A Refocused Vision ( ) Enterprise Cross Domain Services - Partnerships and Progress ( ) INTELINK and Enterprise Cross Domain Services: Going From Strategy to Execution INTELINK - Working Toward a New Horizon 11

13 Conference agenda Tuesday, 3 April Wells Fargo Theatre Morning Announcements Mr. Roy I. Apseloff Vice Deputy Director for Information Management and Deputy Chief Information Officer, Defense Intelligence Agency Cyber Security in the Cloud Ms. Patricia Titus Vice President and Chief Information Security Officer, Symantec Developing the cyber security hygiene needed to protect yourself from simple vulnerabilities, let alone complex advanced persistent threats like Stuxent and Duqu, can be daunting. Defense-grade data protection takes better technology, visibility and control especially in the cloud. This session explores winning best practices for cloud security protection, compliance and organizational alignment. Information Sharing--The Need for an Enterprise Approach Mr. Thomas A. Ferguson Principal Deputy Under Secretary of Defense for Intelligence The lines between National and Military intelligence are blurring - in many cases are gone. Today s missions demand access to information across all classification domains including the unclassified and open internet environment. Synchronization of disparate Service/Agency organizational, architectural and resourcing plans is essential. Based on lessons learned and in a period of declining resources, the Information Enterprise must remove barriers and constraints to data access, use, sharing and dissemination. This Keynote addresses this imperative and challenges the National and Military Intelligence Communities to leverage best practices moving toward a virtually-single, information enterprise commodity, which frees resources for investment in mission capabilities to enhance operational effectiveness. Asymmetric Information Warfare: Challenges and Opportunities in Information Fusion Dr. David L. Hall Dean, College of Information Sciences and Technology (IST) and Professor, Information Sciences and Technology (IST), The Pennsylvania State University Rapid changes in information technology, communications and computing infrastructure, combined with a new generation of end-users provide both challenges and opportunities for information fusion in support of national defense and homeland security. Key trends include: (1) the world-wide proliferation of smart phones and mobile computing, (2) advanced sensors and sensing modalities, (3) the emergence of soft and participatory sensing, (4) an avalanche of open-source information, (5) new humancomputer interfaces, (6) a new generation of digital natives, and (7) the cottage industry of application development. These trends lead to the commoditization of Intelligence, Surveillance and Reconnaissance (ISR). Virtually any individual or small group can obtain high-fidelity surveillance on specified areas of interest via the use of commercial and open source data, along with collaboration via participating observer/collaborators. This ad hoc capability can rival national collection and dissemination resources in limited areas of interest, leading to the equivalent of asymmetric information warfare. This presentation provides perspectives on these challenges and identifies opportunities for the Intelligence Community Technology Exposition / Networking Break Intelligence Integration and the Unifying Intelligence Strategies Mr. Robert Cardillo Deputy Director for Intelligence Integration, Office of the Director of National Intelligence The current ODNI effort to integrate national-level intelligence resourcing, planning and execution dates back almost 40 years. With IRTPA as both directive and guidance, ODNI has matured the Mission Manager concept and combined Analysis and Collection to form the Directorate for Intelligence Integration (DDII), headed by Mr. Robert Cardillo, Deputy Director for Intelligence Integration. Intelligence integration finds its new form with the National Intelligence Manager (NIM) and his/her team, composed of a National Intelligence Officer, a National Intelligence Collection Officer, and a National Counterintelligence Officer. The nine regional and eight functional NIM Teams, in conjunction with the Intelligence Community (IC) Functional Managers and working both inside the IC and throughout the entire U.S. Government, craft Unifying Intelligence Strategies (UIS) to identify priorities and gaps, and to strategically align IC efforts against the highest priorities. Hybrid Cloud, Trust, and Big Data Mr. Patrick Gelsinger President and Chief Operating Officer, EMC Information Infrastructure Products, EMC Corporation Cloud computing is changing the way information technology is architected, deployed and consumed, transforming application-centric IT into data-centric IT, where the information layer becomes the new center of gravity in the data center. To achieve a hybrid cloud model that allows end-users access to information stored on-premise in a private cloud or off-premise in a public cloud, data centers are being transformed into flexible, scalable pools of virtualized infrastructure that can deliver IT as a Service to constituent departments and business units in a much more agile way, while offering the greatest efficiency, control and choice Technology Exposition / Networking Break / Lunch 12

14 Conference agenda Tuesday, 3 April BREAKOUT SESSIONS Room # International Information Systems in a Burden Sharing Environment Integrating Enterprise Security Management Capabilities with Emphasis on IDAM, Digital Policy Management and Smart Data Services/Tools Solutions for the Information Technology Enterprise - Q&A Session with AE Capacity Management Defense Intelligence Integrators Guide (DIIG) DIA and JITC Compliance A-Space Transition to i-space Enterprise Search & Integration Services (ES&IS) Intelligence From Raw Data: Applying Text Analytics to Save Time and Lives Open Source Collection Acquisition Requirements Management System (OSCAR- MS) Future Technology - Evolution of Cloud Private Cloud in Military Intelligence Technology Exposition / Networking Break Services Panel: The Services Advancing Mission Integration IT Governance and the Enabling Enterprise Architecture Managing and Creating IT Efficiencies (Engineered Solutions) DIA-NGA Collaborative Service Provider Initiative Data Fusion Framework - How to "Fuse" Structured and Unstructured Data to "Connect the Dots" HUMINT Domain Advanced Analytics Complying with Executive Order 13526: A Best-Practices Methodology to Deter and Detect Threats, and Defend Sensitive Government Data Online Identity Protection Classification Management Tools - Enabling the IC Mission IC Information Technology Enterprise (IC ITE) Strategy IC Cloud Strategy: The Road Ahead IC Computer Network Defense - ICD 502 & Integrated Defense of the IC Information Environment (Repeated) Cross Domain Solutions to the Enterprise Intelligence Community Applications Mall - Delivering the Capability Current Technology/ Capabilities (Cross Domain Baseline and Portfolio) 13

15 Conference agenda Wednesday, 4 April Wells Fargo Theatre Morning Announcements Mr. Roy I. Apseloff Vice Deputy Director for Information Management and Deputy Chief Information Officer, Defense Intelligence Agency Transformational Technology Mr. David G. Zanca Senior Vice President, Information Technology, Customer Access & Revenue Systems, FedEx Services Interconnected global networks are one of the most powerful forces today. The air express industry is acknowledged as a reliable indicator of the development of commerce worldwide. With physical and digital networks that connect over 220 countries, FedEx understands the essential need for creating interconnected networks and critical partnerships between people, processes and technologies. Mr. David Zanca, Senior Vice President of IT for FedEx Services, will discuss the innovative culture behind FedEx s pioneering past and its forward focus on what s next. DoD IT Modernization Ms. Teresa M. Takai Chief Information Officer, Department of Defense DoD is moving to an Enterprise approach to Information Technology that is driven by the need to secure and protect while ensuring information sharing in today s constrained budget environment. An Industry Perspective on Advancing Mission Integration Mr. Gerard J. DeMuro Executive Vice President, Information Systems & Technology, General Dynamics The declining budget environment presents an opportunity for positive changes. Innovation and teamwork between industry and government, especially in the alignment of business models with government acquisition, are key in advancing mission integration Technology Exposition / Networking Break BREAKOUT SESSIONS (See page 17 for the Breakout Grid) BREAKOUT SESSIONS (See page 17 for the Breakout Grid) Technology Exposition / Networking Break / Lunch BREAKOUT SESSIONS (See page 17 for the Breakout Grid) Technology Exposition / Networking Break Panel Discussion: Enabling IC Integration: Transitioning to an IC IT Enterprise Moderator: Mr. Al Tarasiuk, Assistant Director of National Intelligence and Chief Information Officer, Intelligence Community Panel Members: Ms. Laura Branton, Deputy Director of Enterprise Architecture and Strategy, National Reconnaissance Office Mr. David L. DeVries, Deputy Chief Information Officer for Information, Integration, and Technology, Department of Defense Mr. Thomas W. Hall, Deputy Chief Information Officer for Strategy, Central Intelligence Agency Dr. Keith Littlefield, Chief Information Officer, National Geospatial-Intelligence Agency Mr. Kelly A. Miller, Deputy Chief Information Officer, National Security Agency/Central Security Service Mr. Grant M. Schneider, Deputy Director for Information Management and Chief Information Officer, Defense Intelligence Agency Ms. Mary Lynn Schnurr, Director, Intelligence Community Information Management, Army Intelligence Chief Information Officer, Deputy Chief of Staff, G-2 Headquarters, Department of the Army Mr. Neil T. Tipton, Director, Information Sharing and Partner Engagement, Deputy Under Secretary of Defense for Joint and Coalition Warfighter Support Closing Remarks Mr. Grant M. Schneider Deputy Director for Information Management and Chief Information Officer, Defense Intelligence Agency 14

16 Conference agenda Wednesday, 4 April BREAKOUT SESSIONS Room # Commercial Best Practices for Software Asset Management "Big Data" - Security and Scale in the Era of On-Demand IT Satellite Systems Overview and Threat Assessments JWICS Today and Tomorrow Poritco Next Evolution (PNE) DoDIIS Cross Domain Management Office 2012 and Forward IC Information Technology Enterprise (IC ITE) Strategy (Repeated) Enterprise Search New Capabilities Common Operating Environment Conducting Acquisition Technical Management via an Automated Technology Workflow "Big Data" Problem vs. Big "Data Problem" IT Asset Management at DIA/ITAM Eracent Project Intelligence Mission Management Center (IMMC) Initiative Within PACOM/IC Automating Records Management Using Predictive Technologies Reaching Your Audience with Real Time Publication of Intelligence IDAM Update: The isicmember Attribute: Adding to the ABAC Toolkit Cross Domain Security Assessment Standardization - The Road to Reciprocity Technology Exposition / Networking Break / Lunch Mission Engagement: Becoming the Trusted Partner Supply Chain Risk Management for Government and Industry Partners Big Data Challenge Providing Geospatial Visualization Services Transforming Entity Extraction into Advanced Analytics Advancing Analytics in the Cloud Through GEOINT Research & Development Usage Management in Multi-Level Security Environments NGA Deployment of the Virtual Desktop Assured Sensitive But Unclassified (SBU) Interoperability C4ISR THE VALUE OF BEING ABLE TO SEE THE BIG PICTURE IN THE SMALLEST DETAILS. Designed for maximum effectiveness and affordability, Northrop Grumman C4ISR systems are uniquely ready for the real world. We developed the MOSA-C business and open architecture strategy that makes it easier to add new technology and capabilities over the life cycle avoiding vendor lock-in and reducing costs. And our user-centric design philosophy continuously meets the warfighters ever-changing operational needs. That s why we re a leader in responsive, flexible C4ISR solutions. THE VALUE OF PERFORMANCE Northrop Grumman Corporation 15

17 breakout session Key & Details Applications Security & Cyber Big Data Sharing Business Intelink Service Management Center (ISMC) Cloud ODNI Management Framework UCDMO DOD & DNI UCDMO Partners Monday, 2 April Room # How DI2E Works With DoDIIS Ms. Lorraine Wilson, OUSD(I) This breakout will focus on how DoDIIS, DI2E, and IC Cloud Reference Implementation will come together, and core services to collaboratively synchronize between environments. Room # Strategy and Technical Roadmaps Mr. Erin Redmond, DIA This presentation links the four goals of the DS Strategic Vision to the DIA Strategy and introduces the Technology Strategy and Roadmap a vision for future technologies in six focus areas. Room # DoDIIS Software Licensing Process and New Policy Mr. Robert Henschen, DIA The breakout will provide an overview of the processes for DoDIIS Software Licensing for customers, managers and vendors. Review new DIA Policy on software licensing and how it affects PMs, contractors, finance personnel, customers and acquisition staff. Review the processes involved in acquiring licenses and procuring new software. Give overview of DoDIIS COTS software standards. Room # Intelligence Community Applications Mall Aligning Mission Capability Delivery Mr. Jason Kahn, NSA In support of the IC IT Efficiencies activates, the NSA is engaging the community to deliver common platforms, storefronts and application standards for the delivery of mission and business applications. 16

18 Monday, 2 APRIL For track key, please see page 16 Room # DoDIIS Enterprise Content Management System (econtent) Ms. Barbara Sullivan, DIA econtent s objective is to satisfy the mission-critical intelligence requirement to capture, store, distribute and control access to evaluated intelligence products and analytic source files from organizations throughout the national and defense Intelligence Communities. econtent supports the DIAP goal to provide timely, objective and cogent military intelligence to warfighters, defense planners, and defense and national policy makers. econtent is the principal repository for defense intelligence analysis products and facilitates current business processes for managing products and content through integration of supporting technologies and compliance with community standards; provides a PL3 solution to support storage and processing of HCS, GAMMA, and ORCON, using a standards-based, service-oriented architecture (SOA) approach; provides support to both open and closed communities of interest (COIs); provides Need-to-Share (NTS)/ ICD-501 Discovery and Access Management of HCS, GAMMA, and ORCON products/documents using User Attributes available from via DIA (i.e., DIAS groups, Scattered Castles, and GIMMEE). Room # A JARM View of DI2E and Data Cloud Frameworks Mr. Christopher Biow, MarkLogic The Joint Architecture Reference Model provides a complementary view for Data Cloud Frameworks such as DI2E. We explore presentation, data services, and infrastructure levels with emphasis on analytics applications. Room # Content Discovery and Retrieval Specifications for Composable, Secure Services Ms. Susan Jaxel, ODNI There are many attempts at defining Service Oriented Architecture (SOA), more than a few being circular in their references between SOA and services. The OASIS SOA Reference Model provides a different focus: Service Oriented Architecture (SOA) is a paradigm for organizing and utilizing distributed capabilities that may be under the control of different ownership domains. This is important in the context of security and SOA for two reasons. First, a significant motivation for SOA is the reuse of services from different sources, enabling the composition of basic building blocks into more complex solutions. If services are the means to utilizing distributed capabilities within compositions, they must be appropriately scoped and provide functionality that is widely applicable to many solutions. It is also important to be clear what we mean by and expect of composability. Second, if we are to cross ownership in using services, there must be sufficient trust among actors for them to be willing to participate in service interactions. One element of establishing trust is sufficient and predictable security. The breakout will explore both of these aspects of the secure use of services. We will review the efforts of the Joint IC/DoD Content Discovery and Retrieval (CDR) Integrated Product Team (IPT) to define the core components needed to address the CDR challenges and begin to look at what the composition of services implementing these core components can provide. We consider the variety of compositions possible and then discuss the needs of CDR solution architects to be well-versed in and be able to incorporate security guidance when designing service solutions. The overall goal is to sensibly enable rather than reflexively limit the flexibility that a SOA ecosystem is expected to deliver. Room # System Security Engineering Mr. Dorian Pappas, NSA Increasing the effectiveness of risk management requires System Security Engineering to be incorporated throughout the systems lifecycle. A key element of this strategy is the SSE process and guidelines that apply to all system lifecycle stages across a variety of domains and environments. These applications include: aerospace, commerce, critical infrastructure, government, industrial, intelligence, military and finance. Room # 404 UCDMO Unified Cross Domain Management Office (UCDMO): A Refocused Vision Ms. Sandi Roddy, UCDMO DOD & DNI Cross Domain (CD) technologies enable trusted information sharing between security domains and across the cyber plane. The UCDMO is the central knowledge broker, focusing on pertinent CD governance, reciprocity, capabilities and risk challenges. This overview outlines our re-focused mission and operational objectives, with emphasis on enterprise CD services across the IC. 17

19 breakout session details Room # JWICS Connection Approval Process (JCAP) Mr. Jeremy Behrens, DIA This brief will go over the upcoming new JWICS Connection Approval Process (JCAP) to provide an understanding of the changes being enacted in response to detailed information not being available. Room # Solutions for the Information Technology Enterprise STORMs Update and Demo Ms. Camille Lakhani, DIA STORMs update and demonstration for industry only. This presentation will ensure vendors are aware and follow instructions for uploads to the database. Room # Evolving DoDIIS IT Services Mr. Douglas Cate, DIA The DIA DS Services model has been focused on infrastructure. It has yet to address customer functional missions where IT capabilities are implemented and managed based on the functional mission and priority of the supported customer. To be successful, IT managers must have a detailed understanding of the supported mission areas. This session will cover the IT Maturity Model, compare the DS Services Model to the IC Joint Architecture Reference Model and discuss how to align DIA IT services to the new IT governance structure. Room # DCGS Data Framework and Data Sharing Across the IC and C2 Communities Mr. Giuliano Rubini, USAF This discussion features the DCGS Data Framework, a government open source, software framework for intelligence and C2 sharing across the Intelligence and Command, and Control communities. Room # No Names Left Behind: Better and Faster Arabic, Pashto, and Dari Name Translation Ms. Jennifer Flather, Basis Technology; Mr. Joel Ross, Basis Technology This talk will introduce the components of Highlight available to ICD users via ODNI through problem-solving scenarios, such as forensic processing of digital media to extract and translate personal names, and deciphering personal names from a visitor request form. Room # Cloud; The Magic and Myth (PaaS, IaaS, SaaS, Engineered Solutions, MLS) Mr. David Knox, Oracle Computer workloads are not the same. Most of today s enterprises run varied sets of workloads with a system to run database, applications, some middle ware and analytics, and means to enrich the user experience. Further, missions and world events necessitate the development of an analytical and utility cloud compute constructs that allow for secure, cost effective, quick context switching clouds. In this discussion we will outline best practices and approach to integrate, federate and secure cloud technologies. Room # Advanced Persistent Threat Mr. David Marcus, McAfee The threat landscape is rapidly changing to one of advanced persistent threats and stealth attacks. Recognizing that a new approach is needed to stay ahead of cybercriminals while ensuring that users have an engaging and productive computing experience, it is essential that devices are protected against intrusions from security breaches and malware in more effective ways. Every type of device is vulnerable, and it is this recognition combined with the desire to take a holistic approach to secure computing that led to the DeepSafe technology. With DeepSafe, McAfee and Intel are working to change the industry by combining the power of hardware and software to create much more sophisticated ways to prevent attacks. Cybercriminals know how to evade current operating systems-based security, demanding a new paradigm - security beyond the operating system. 18

20 Monday, 2 APRIL For track key, please see page 16 Room # ICD 503 Mr. Frank Sinkular, UCDMO We will provide an update to ICD 503 implementation. It will include policy and process as the IC moves forward in finalizing the transition from the rescinded DCID 6/3. Room # Solutions for the Information Technology Enterprise - COR Sessions to Implement Policy Ms. Camille Lakhani, DIA; Mr. David Ziner, DIA COR session to implement policy for COR files and STORMs updates. Room # 404 UCDMO Enterprise Cross Domain Services Partnerships and Progress Mr. Bruce Calkins, UCDMO DOD & DNI This presentation will highlight current and planned activities towards IC-wide and DoD-wide Enterprise Cross Domain Services (ECDS), discuss key community partnerships, identify progress and assess challenges. Room # INTELINK and Enterprise Cross Domain Services: Going From Strategy to Execution Mr. Alex Voultepsis, INTELINK In response to mission needs from U.S. Treasury, INTELINK and the UCDMO engage the broad community to navigate a successful course of action to deliver cross domain services to the Enterprise Technology Exposition / Networking Break Room # COCOM JIOC Challenges and Initiatives Moderator: Mr. John Marshall, Joint Staff Panel Members: Mr. Jose Arredondo, USFK; Mr. Thomas Coughlin, SOCOM; Mr. Richard Hoehne, EUCOM; CAPT Bruce Loveless, PACOM; Mr. Terence Meyer, CENTCOM; Mr. Gary Thompson, SOUTHCOM; Mr. Nicholas Whiteside, TRANSCOM; Mr. James Williams, Joint Staff This panel will be comprised of COCOM JIOC representatives providing their perspective of Intelligence IT capabilities gaps, and requirements to meet their theater missions. Room # Knowledge Management s (KM) New Role in Setting the Benchmark for the Customer IT Relationship Towards Advancing Mission Integration Mr. Brian Fila, DIA Through effective partnership with DS, DIA s Directorate for Analysis Knowledge Management Office is establishing the benchmark for the customer-it relationship focused on achieving mission integration into the 21st century. Room # Distributed Common Ground System Army (DCGS-A) Standard Cloud (DSC) COL Charles Wells, PEO IEWS The DCGS-A Standard Cloud program s implementation of the IC Cloud Computing Reference Architecture Version 2.0 demonstrates its intent to unify defense intelligence infrastructure and information sharing initiatives. Room # Survey of Wireless & Mobility Architectures for Communication and Collaboration Mr. Michael Harttree, Cisco This survey will review existing and emerging wireless and mobility architectures designed to support Intelligence and DoD enterprise and expeditionary operations. 19

Rising to the Challenge

Rising to the Challenge CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned

More information

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,

More information

DISA Testing Services for the Enterprise. Luanne Overstreet

DISA Testing Services for the Enterprise. Luanne Overstreet DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES. Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive

More information

Cyber Watch. Written by Peter Buxbaum

Cyber Watch. Written by Peter Buxbaum Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations

More information

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who

More information

Providing On-Demand Situational Awareness

Providing On-Demand Situational Awareness ITT Exelis Geospatial Intelligence Solutions Providing On-Demand Situational Awareness Use of U.S. Department of Defense (DoD) and U.S. Army imagery in this brochure does not constitute or imply DoD or

More information

How To Build A Cloud Based Intelligence System

How To Build A Cloud Based Intelligence System Semantic Technology and Cloud Computing Applied to Tactical Intelligence Domain Steve Hamby Chief Technology Officer Orbis Technologies, Inc. shamby@orbistechnologies.com 678.346.6386 1 Abstract The tactical

More information

Reliable, Repeatable, Measurable, Affordable

Reliable, Repeatable, Measurable, Affordable Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you

More information

The State of DoD Biometrics

The State of DoD Biometrics The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E thomas.dee@osd.mil 1 Agenda What We ve Done Biometrics

More information

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs

More information

This Conference brought to you by www.ttcus.com

This Conference brought to you by www.ttcus.com This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com U.S. Army Intelligence and Security Command Army

More information

Cybersecurity Delivering Confidence in the Cyber Domain

Cybersecurity Delivering Confidence in the Cyber Domain Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your

More information

Army Intelligence Industry Day Foundation Layer Technology Focus Areas

Army Intelligence Industry Day Foundation Layer Technology Focus Areas CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,

More information

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

The cloud - ULTIMATE GAME CHANGER ===========================================

The cloud - ULTIMATE GAME CHANGER =========================================== The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud

More information

Fight fire with fire when protecting sensitive data

Fight fire with fire when protecting sensitive data Fight fire with fire when protecting sensitive data White paper by Yaniv Avidan published: January 2016 In an era when both routine and non-routine tasks are automated such as having a diagnostic capsule

More information

Our Vision. 2 For complete details and availability contact: 703-610-9038 or dlafont@the-aaa.org

Our Vision. 2 For complete details and availability contact: 703-610-9038 or dlafont@the-aaa.org Media Kit 2015 Our Mission Founded in 1979, the AAA's Mission is: "To promote health care policies that ensure excellence in the ambulance services industry and provide research, education and communications

More information

Accenture Cloud Platform Unlocks Agility and Control

Accenture Cloud Platform Unlocks Agility and Control Accenture Cloud Platform Unlocks Agility and Control 2 Accenture Cloud Platform Unlocks Agility and Control The Accenture Cloud Platform is at the heart of today s leading-edge, enterprise cloud solutions.

More information

Navy Information Dominance Industry Day

Navy Information Dominance Industry Day Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic

More information

Transform Performance Through. Enterprise Integration

Transform Performance Through. Enterprise Integration Transform Performance Through Enterprise Integration In today s world, success is a complicated business. Missions and requirements are expanding. Budgets are shrinking. Your ability to automate processes,

More information

SPONSORSHIP PROSPECTUS

SPONSORSHIP PROSPECTUS SPONSORSHIP PROSPECTUS Integrating Energy for the Quality of Life The Smart Grid Interoperability Panel (SGIP) is a consortium that securely accelerates and advances Grid Modernization through interoperability

More information

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches. Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference

More information

SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government

SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond

More information

AGILE (SCRUM) WORKSHOP Sponsored by the C4ISR Division of NDIA

AGILE (SCRUM) WORKSHOP Sponsored by the C4ISR Division of NDIA PROMOTING NATIONAL SECURITY SINCE 1919 AGILE (SCRUM) WORKSHOP Sponsored by the C4ISR Division of NDIA EVENT #2750 HYATT REGENCY BALTIMORE u BALTIMORE, MD WWW.NDIA.ORG/MEETINGS/2750 MONDAY, NOVEMBER 14

More information

Understanding ArcGIS Deployments in Public and Private Cloud. Marwa Mabrouk

Understanding ArcGIS Deployments in Public and Private Cloud. Marwa Mabrouk Understanding ArcGIS Deployments in Public and Private Cloud Marwa Mabrouk Agenda Back to Basics What are people doing? New Features Using ArcGIS in the Cloud - Private Cloud - Public Cloud Technical Demos

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

Health Care Solutions

Health Care Solutions Health Care Solutions Increase Service Levels, Meet Expectations A Unified Approach to Health Care Automation Processes Hospitals, clinics, extended care facilities, and physician s offices are facing

More information

DoD Strategy for Defending Networks, Systems, and Data

DoD Strategy for Defending Networks, Systems, and Data DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July

More information

5 Steps to Choosing the Right BPM Suite

5 Steps to Choosing the Right BPM Suite 5 Steps to Choosing the Right BPM Suite BPM Suites can deliver significant business benefits and a fast ROI but only if you choose the right one By Laura Mooney, Metastorm Copyright 2009, Metastorm Inc.

More information

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality

More information

Integrated Social and Enterprise Data = Enhanced Analytics

Integrated Social and Enterprise Data = Enhanced Analytics ORACLE WHITE PAPER, DECEMBER 2013 THE VALUE OF SOCIAL DATA Integrated Social and Enterprise Data = Enhanced Analytics #SocData CONTENTS Executive Summary 3 The Value of Enterprise-Specific Social Data

More information

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise HP ENTERPRISE SECURITY Protecting the Instant-On Enterprise HP SECURITY INTELLIGENCE AND RISK MANAGEMENT PLATFORM Advanced Protection Against Advanced Threats 360 Security Monitoring to Detect Incidents

More information

Cloud Computing: What IT Professionals Need to Know

Cloud Computing: What IT Professionals Need to Know Learning Cloud Computing: What IT Professionals Need to Know Cloud computing promises new career opportunities for IT professionals. In many cases, existing core skill sets transfer directly to cloud technologies.

More information

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

IDC US UPCOMING EVENT CALENDAR

IDC US UPCOMING EVENT CALENDAR IDC US UPCOMING EVENT CALENDAR Software as a Service (SaaS) Summit Contact: Patty Caron, Program Director, pcaron@idc.com Lead Analysts: Michael Fauscette and Robert P. Mahowald September 17, 2008 San

More information

DEFENSE INTELLIGENCE INFORMATION ENTERPRISE

DEFENSE INTELLIGENCE INFORMATION ENTERPRISE SPONSORSHIP INFORMATION Plugfest DEFENSE INTELLIGENCE INFORMATION ENTERPRISE EVENT #4A07 Plugfest BECOME A SPONSORING PARTNER DI2E Plugfest is the only event for the defense community that actively demonstrates

More information

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security Russ Dietz Vice President & Chief Technology Officer Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security By Russ Dietz Vice President & Chief

More information

Information Technology Asset Management

Information Technology Asset Management Information Technology Asset Management HARDWARE SOFTWARE AND SERVICES AUBREY P. JONES, PMP DATA SYSTEMS ANALYSTS, INC SUMMARY Management of government/defense IT assets is an increasing target for cost

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

GETTING REAL ABOUT SECURITY MANAGEMENT AND BIG DATA GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats

More information

WHITE PAPER. CRM Evolved. Introducing the Era of Intelligent Engagement

WHITE PAPER. CRM Evolved. Introducing the Era of Intelligent Engagement WHITE PAPER CRM Evolved Introducing the Era of Intelligent Engagement November 2015 CRM Evolved Introduction Digital Transformation, a key focus of successful organizations, proves itself a business imperative,

More information

Forecast to Industry 2015

Forecast to Industry 2015 Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:

More information

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?

More information

Unified Communications-as-a-Service (UCaaS) for Video Conferencing

Unified Communications-as-a-Service (UCaaS) for Video Conferencing Unified Communications-as-a-Service (UCaaS) for Video Conferencing The proliferation of technology at a consumer level has been empowering. Laptops, tablets and smart phones now come equipped with extensive

More information

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events

More information

IABC 2015 World Conference. 14 17 June. Marriott Marquis San Francisco. Sponsorship Opportunities

IABC 2015 World Conference. 14 17 June. Marriott Marquis San Francisco. Sponsorship Opportunities IABC 2015 World Conference 14 17 June Marriott Marquis San Francisco Sponsorship Opportunities SPONSORSHIP OPPORTUNITIES IABC 2015 WORLD CONFERENCE WHO The International Association of Business Communicators

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

HP CLOUD SYSTEM. The most complete, integrated platform for building and managing clouds featuring Intel technologies.

HP CLOUD SYSTEM. The most complete, integrated platform for building and managing clouds featuring Intel technologies. HP CLOUD SYSTEM The most complete, integrated platform for building and managing clouds featuring Intel technologies Presenter Title 2010 2011 Hewlett-Packard Development Company, L.P. The information

More information

How To Be An Integrated Omnichannel Retailer

How To Be An Integrated Omnichannel Retailer OMNICHANNEL RETAILING: FROM VISION TO REALITY Exploring how to meet the critical need for bringing superior anytime, anywhere shopping journeys to life For more information visit ncr.com or contact us

More information

HP and netforensics Security Information Management solutions. Business blueprint

HP and netforensics Security Information Management solutions. Business blueprint HP and netforensics Security Information Management solutions Business blueprint Executive Summary Every day there are new destructive cyber-threats and vulnerabilities that may limit your organization

More information

AD Management Survey: Reveals Security as Key Challenge

AD Management Survey: Reveals Security as Key Challenge Contents How This Paper Is Organized... 1 Survey Respondent Demographics... 2 AD Management Survey: Reveals Security as Key Challenge White Paper August 2009 Survey Results and Observations... 3 Active

More information

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM

More information

Enabling the Mobile Enterprise: Don t fight it. Feature it.

Enabling the Mobile Enterprise: Don t fight it. Feature it. EOH CIO CIO Connect Connect White Paper White Enabling the Paper Mobile Enterprise Enabling the Mobile Enterprise: Don t fight it. Feature it. By Alex Russell, EOH The Bring Your Own Device (BYOD) trend

More information

ENABLING A RESPONSIVE AND AGILE INTELLIGENCE ENTERPRISE

ENABLING A RESPONSIVE AND AGILE INTELLIGENCE ENTERPRISE ENABLING A RESPONSIVE AND AGILE INTELLIGENCE ENTERPRISE A White Paper prepared by the AFCEA Intelligence Committee April 2008 Serving Intelligence Professionals and their Community SpringIntel08_WhitePaperCover

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications

FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications Keith Swenson VP R&D, Chief Architect Fujitsu America, Inc. May 30, 2013 We are a software company

More information

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their

More information

Software Defined Hybrid IT. Execute your 2020 plan

Software Defined Hybrid IT. Execute your 2020 plan Software Defined Hybrid IT Execute your 2020 plan Disruptive Change Changing IT Service Delivery Cloud Computing Social Computing Big Data Mobility Cyber Security 2015 Unisys Corporation. All rights reserved.

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Software as a Service Flexible Service Delivery for Your Health Insurance Exchange

Software as a Service Flexible Service Delivery for Your Health Insurance Exchange Software as a Service Flexible Service Delivery for Your Health Insurance Exchange SaaS Health Insurance Exchanges Improving Services through More Cost-Efficient Delivery States are charged with making

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

Big Data Integration: A Buyer's Guide

Big Data Integration: A Buyer's Guide SEPTEMBER 2013 Buyer s Guide to Big Data Integration Sponsored by Contents Introduction 1 Challenges of Big Data Integration: New and Old 1 What You Need for Big Data Integration 3 Preferred Technology

More information

Realizing the Value Proposition of Cloud Computing

Realizing the Value Proposition of Cloud Computing Realizing the Value Proposition of Cloud Computing CIO s Enterprise IT Strategy for Cloud Jitendra Pal Thethi Abstract Cloud Computing is a model for provisioning and consuming IT capabilities on a need

More information

Click to edit Master title style

Click to edit Master title style Click to edit Master title style UNCLASSIFIED//FOR OFFICIAL USE ONLY Dr. Russell D. Richardson, G2/INSCOM Science Advisor UNCLASSIFIED//FOR OFFICIAL USE ONLY 1 UNCLASSIFIED Semantic Enrichment of the Data

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8320.05 August 18, 2011 ASD(NII)/DoD CIO SUBJECT: Electromagnetic Spectrum Data Sharing References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes

More information

Top five lessons learned from enterprise hybrid cloud projects

Top five lessons learned from enterprise hybrid cloud projects Top five lessons learned from enterprise hybrid cloud projects Top performer highlights More than half of top performers give users access to selfservice provisioning across both private and public cloud

More information

NTT i 3 Cloud Services Orchestration Platform

NTT i 3 Cloud Services Orchestration Platform NTT i 3 Cloud Services Orchestration Platform Enabling the Digital Business 2 Our Point of View Cloud computing is a business imperative, not just a technology trend IaaS, PaaS and SaaS are becoming mainstream,

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information

Creating a Service-Oriented IT Organization through ITIL

Creating a Service-Oriented IT Organization through ITIL Creating a Service-Oriented IT Organization through ITIL Glenn O Donnell EMC Corporation 1 Creating a Service-Oriented IT Organization through ITIL What is ITIL and Why is it So Popular? ITIL s Impact

More information

State of the States: IT Trends, Priorities and Issues

State of the States: IT Trends, Priorities and Issues State of the States: IT Trends, Priorities and Issues OSC Financial Conference 2012 Doug Robinson, Executive Director National Association of State Chief Information Officers Fiscal recovery: budgets are

More information

The Software-Defined Enterprise. Thriving in the Mobile-Cloud Era

The Software-Defined Enterprise. Thriving in the Mobile-Cloud Era The Software-Defined Enterprise Thriving in the Mobile-Cloud Era The best way to predict your future is to create it. Abraham Lincoln IT Challenges in the Mobile-Cloud Era IT Technology Eras Mainframe

More information

Simply Sophisticated. Information Security and Compliance

Simply Sophisticated. Information Security and Compliance Simply Sophisticated Information Security and Compliance Simple Sophistication Welcome to Your New Strategic Advantage As technology evolves at an accelerating rate, risk-based information security concerns

More information

Data Center Solutions

Data Center Solutions Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing, deploying

More information

How To Manage A Network Security Risk

How To Manage A Network Security Risk Scanless Vulnerability Assessment: Skybox Security whitepaper July 2014 1 Overview Vulnerability scanning, or the process of identifying a list of known security gaps in the network environment, is the

More information

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee

More information

HP Service Manager software

HP Service Manager software HP Service Manager software The HP next generation IT Service Management solution is the industry leading consolidated IT service desk. Brochure HP Service Manager: Setting the standard for IT Service

More information

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes

More information

Business Intelligence & IT Governance

Business Intelligence & IT Governance Business Intelligence & IT Governance The current trend and its implication on modern businesses Jovany Chaidez 12/3/2008 Prepared for: Professor Michael J. Shaw BA458 IT Governance Fall 2008 The purpose

More information

Obtaining Enterprise Cybersituational

Obtaining Enterprise Cybersituational SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational

More information

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 admin@trustedcomputinggroup.org

More information

Enterprise Capabilities Descriptions

Enterprise Capabilities Descriptions 1 SYSTEMS ENGINEERING & INTEGRATION 6 COMMUNICATIONS SYSTEMS 11 LIFECYCLE SYSTEMS ENGINEERING 12 LIFECYCLE SYSTEMS INTEGRATION 13 MISSION INTEGRATION 14 DISCIPLINES 15 DOMAINS 2 CYBER 21 CYBER STRATEGIC

More information

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT) Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction

More information

How To Monitor Your Entire It Environment

How To Monitor Your Entire It Environment Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................

More information

Defending against modern cyber threats

Defending against modern cyber threats Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o u d

W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o u d Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E d u c a t i o n a t t h e C r o s s r o a d s o f B i g D a t a a n d C l o

More information