Marshaling Data for Enterprise Insights A 10-Year Vision for the US Department of Homeland Security

Size: px
Start display at page:

Download "Marshaling Data for Enterprise Insights A 10-Year Vision for the US Department of Homeland Security"

Transcription

1 Marshaling Data for Enterprise Insights A 10-Year Vision for the US Department of Homeland Security

2 Marshaling Data for Enterprise Insights A 10-Year Vision for the US Department of Homeland Security As owners of one of the most comprehensive data environments in the US federal system, the US Department of Homeland Security (DHS) has an asset like no other for conducting its basic mission of safeguarding America s citizens, infrastructure, and borders. The information it collects is as diverse as the missions of the many agencies and offices under its purview, ranging from the Transportation Security Administration (TSA) to the Federal Emergency Management Agency (FEMA), US Customs and Border Protection (CPB), Immigration and Customs Enforcement (ICE), the US Secret Service, and the Coast Guard. Because the mission of DHS is so broad and all consuming, it is challenged with ushering in the kinds of changes that its data regime needs to render new insights and drive down costs. Each of the extensive data sets that DHS and its components maintain supports specific mission needs and exists under established legal and regulatory authorities. Their owners naturally strive to improve the efficiency and effectiveness of data analysis for their intended purposes. But even when users recognize the mission benefits of sharing data and conducting analysis across multiple data sets, they too often run into technical, procedural, legal, and cultural barriers to shared analysis. These barriers are preventing DHS from realizing the full potential of the data it has as its disposal. Intelligence and law enforcement analysts searching for terrorists, and other threats, need the ability to paint a comprehensive picture that considers all kinds of data at once such as travel and entry and exit records, evidence that ties suspected terrorists or criminals to illicit shipments of cash or contraband, or involvement of specific individuals or groups in diverse criminal activities, from weapons trafficking to cyber crime. The need to learn from and capitalize on multiple sources of data is no less urgent for DHS teams responsible for responding to emergencies, enforcing trade agreements, combating transnational criminal organizations, managing the flow of people through US borders, protecting intellectual property rights, and safeguarding America s critical infrastructure. Over the coming years, DHS will need to master the ability to marshal its tremendous repository of data while still living up to its manifold day-to-day responsibilities. These tasks are mutually dependent the bridge must be rebuilt while remaining open to traffic. We believe it will be easier for DHS to manage its transformation into a data-enabled enterprise if it attacks the problem from a mission perspective and taps emerging cloud-based analytics to gain new insights from the information it already has at its disposal. Through this effort, DHS can significantly elevate its role in the nation s homeland security ecosystem, position itself as a valuable and insight-driven partner to other crime enforcement agencies, and increase the efficiency of its mission-support functions. Opening the Aperture When Michael Chertoff became the second secretary of homeland security in 2005, one of his first priorities was to change a departmental policy of only taking two fingerprints from each person either wanting a visa to come into the country or for those traveling without visas. Chertoff reasoned that by only taking two fingerprints one from each index finger homeland security personnel were potentially missing scores of 1

3 latent fingerprints, or the fingerprint residue collected all over the world at crime scenes, in safehouses where terrorists plan, and even on battlefields. By expanding the information collected from travelers to 10 fingerprints, Chertoff said that the DHS significantly enhanced its capability to identify those who weren t included on watch lists but left a little piece of themselves somewhere and some place that suggests we ought to take a closer look. 1 Chertoff s policy change was predicated on the belief that information is power. By opening the department s aperture to collect more information, he reasoned that the department was strengthening its powers to detect bad actors before they performed bad deeds. This premise is at the heart of all homeland security efforts, and yet, there are real and significant constraints to expanding the amount of pertinent data that each DHS entity has at its disposal. The most significant constraint is rooted in the department s origins bringing 22 different agencies under one organization necessarily meant bringing their legacy information technology systems with them. While considerable progress has been made in improving these systems over the last 10 years, too little has been done to address the challenges of sharing data and conducting analysis across these systems. As a result, DHS has limited the usefulness of its data. Users have to mine a number of databases to find answers to problems identified at the policy level or pursue particular cases, and these efforts have historically been susceptible to redundancy and lack of coordination. In addition, the people operating at the collection end of those stovepipes have little incentive to acquire information that isn t directly relevant to their own priorities, even though it might be very important to others. But the issue also goes to a lack of awareness that data exist in the first place. In the homeland security setting, the real power of data is not limited to helping you solve problems identified elsewhere it s identifying new problems so you can get ahead of them. Information sharing relies on the owner of that information to recognize its value to others, and this is very seldom the case. As a result of this shortcoming, information just stays where it is, where it has no value at all. It s as if 10 different DHS entities were each collecting a print sample from a different finger, but nobody could ever put them together because there was no mechanism for matching them up. These organizational and other barriers are particularly problematic for homeland security leaders trying to secure the nation s borders, keep ahead of criminal organizations, enforce and facilitate trade and travel, and plan for emergency response. For instance, Customs and Border Protection has developed reasonably effective processes for physically and virtually screening cargo shipments by analyzing trade data supplied by shippers and other information on the flow of goods into and out of ports of entry. But it is difficult to link that data to information on individuals who may be involved in those shipments, the past 1 Remarks by Michael Chertoff, shtm 2

4 histories of the conveyances used in the shipments, and the money and data flows that accompany all movement of goods whether legal or not. Part of this difficulty stems from the fact that different agencies relying on different databases are responsible for different aspects of securing and facilitating the movement of people, goods, money, and data. A data point as plain as a phone number on a bill of lading could be associated with a known terrorist, but it won t be flagged for follow-up if nobody inside CBP understands its value and those outside of CBP remain unaware that this information is even being tracked. Only by revealing the presence of data in the first place can DHS and its partners expect its analysts at the edge to make these critical connections. More Tooth, Less Tail DHS faces the added challenge of evolving into a datacentric organization at a time when every cost is being scrutinized. While mission challenges remain high, the department is facing budget constraints unprecedented in its 10-year history. As in the military, concern is growing that the tail of back-office functions has grown too big and unwieldy to support DHS s mission in a timely and cost-effective manner. One of the biggest complaints coming from inside the organization is that staffers have to supply the same data to five or six different entities. That level of duplication is expensive and ties up valuable resources. This spending seems particularly out of synch when analysts working at the edge of the enterprise have a limited view of the information the back-office support groups are helping to maintain. Our view is that DHS has the opportunity to become a leaner, more productive organization in the future if it harnesses the power of the data it already collects today to support its many mission objectives. In 10 years' time, we see DHS components thinking of themselves as collective sources and sharers of information rather than separate parts of a larger bureaucracy. DHS must tap the potential of its data much in the way that retailers, banks, and healthcare providers of today are tapping every available piece of information about their customers to predict their behavior and help set strategy. Investigators, inspectors, and analysts in the field will know what kinds of data are being collected across the organization, so they know where to go to mine for information and learn more about the cases they are pursuing. Ultimately, this capability will be extended from mission data to mission-support activities to help DHS more efficiently manage its personnel, property, fixed assets, and finances. Mining Big Data for Insights The first step in developing this capability and transforming DHS into a data-enabled enterprise is to embrace a new method of keeping track of and accessing information one specifically designed for big data that is distributed in a classified or law enforcement environment. The emergence of cloud computing technologies has paved the way for organizations to unlock new insights by coupling technological infrastructure with analytical tools to gain better access to all of the data they have at their disposal. To support this new capability, DHS must have a full and working knowledge of all the types of data its many entities collect on a regular basis. As it stands now, a DHS analyst is only able to locate the information he or she needs if they know precisely where it is housed in one database or another. But DHS s experience reveals that this is seldom the case; users move from database to database, searching for specific information that may or may not be there. If users want to ask different kinds of questions, they often have to reengineer both the databases and the analytics involved a process that can be prohibitively long and expensive. This tends to limit both the complexity of the questions that are asked and the utility of the results. 3

5 What DHS needs to derive actionable insights from its data is to evolve toward a platform where the data can be staged for advanced analytics. Cloud-based technology solutions now avail organizations with an effective and efficient way to load, store, and access multiple data sources to enable multivariate analytics in a mission-specific setting. The evolution will systematically convert the DHS s collection of individual databases into a consolidated and connected pool of information or data lake making all of it readily accessible for all types of analysis. With the data lake, users can easily tap all of the available data in a variety of constantly changing ways. A key feature of the data lake is that information is no longer defined strictly by its location. Specific pieces of supporting information known as meta-data, or data about the data are identified by embedded tags that allow for sorting and identification. In the shipping container example illustrated above, the user could find the phone number listed on the bill of lading simply by searching for it, regardless of which DHS agency captured the information. The process of tagging information is not new it is commonly done within specific datasets or databases. What is new is using the cloud in combination with the technique to make it available to a wide array of users. This is an important distinction, as an important advantage of the data lake is there is no need to build, tear down, and rebuild rigid data structures. The most transformative aspect of a cloud analytics reference architecture that incorporates a data lake is that users do not need to have the possible answers in mind when they ask questions. Instead, they can let the data talk to them. The ability to make complex inquiries, easily switching in and out any number of variables, allows users to look for patterns, and then follow them wherever they may lead. This is particularly important in predictive analytics, when people may not know exactly what they are seeking. This capability strengthens the power of inquiry by empowering data to help reveal new or broader questions and correlations, expanding insight into scenarios and challenges. Importantly, a data lake also helps draw from unstructured and streaming data, which exist in forms that cannot be directly placed in structured databases and data sets. Our prior work with another intelligence-driven organization shows that a data lake can be employed even when classified information is at issue by putting appropriate levels of security and authorization in place. The solution called for predictive analytics to use existing data to forecast potential events and detect anomalies in order to extract potentially significant information and patterns. Our design focused on keeping transactional-based queries in the current relational databases, while doing the heavy lifting in the cloud and outputting the results into relational data stores for quick access. The new cloud solution provided immediate and striking improvements across the increasing volume of structured and unstructured data using aggressive indexing techniques, on-demand analytics, and precomputed results for common analytics. By combining sophistication with scalability, the solution helped move the organization from a situation in which analysts stitched together sparse bits of data to a platform for distilling real-time, actionable information from the full aggregation of data. Many such opportunities now exist in Homeland Security. For example, the National Cybersecurity and Communications Integration Center (NCCIC) faces the challenge of making full use of the numerous data feeds it receives from a variety of government, privatesector, and other organizations. Because much of the data is unstructured, or resides in discrete data sets that are difficult to connect, NCCIC may get only a partial, delayed picture of cyber and communications incidents. Booz Allen Hamilton s Cloud-based Services would enable NCCIC to consolidate all its available data of every type, from all sources and then automatically search through its entirety for important correlations and patterns. With this ability to put all the 4

6 pieces together and see the full picture, NCCIC could better respond to incidents in real time, and provide more accurate situational awareness to stakeholders. In another example, Cloud-based Services would enable DHS and the Department of Justice (DOJ) to integrate the intelligence they gather in their shared Southwest border mission. Currently, the critical ability of the two agencies to gain a common operating picture is hampered not just by the wide range of structured and unstructured data collected, but also by the various restrictions, authorities and security issues around storing, managing and accessing that data. Through Cloud-based Services, DHS and DOJ can create a common operating picture while maintaining the different sets of rules for the data all in one system, rather than in many. This ultimately frees the mission operators and the IT organizations supporting them from the need for proprietary solutions, and from the resource-depleting operations and maintenance costs tied to those solutions. Cloud-based Services would also allow DHS to break through major cost barriers with a shared data environment for the department s component agencies. Currently, agencies often share space at data centers. Cloud-based Services takes a major step forward by creating an environment in which the agencies share a common data pool, as well as reusable analytic and visualization software that taps into the pool. What occurs is a decoupling of the data from the software, substantially driving down costs and creating previously unobtainable economies of scale. Oversight and Backing Of course, DHS will need to maintain adequate governance of its data to help decide which information is included in the data lake and who is authorized to access it. To this end, DHS will need a dedicated team to provide this level of governance. Many commercial enterprises have turned to a chief data officer (CDO) to serve this function and increase the transparency of their data. This idea, or something like it, could serve DHS well. The CDO and their staff should not be confused with a chief information officer or chief technology officer. Where these other two functions provide general infrastructure support to the rest of the organization in a commercial setting, CDOs work much more closely with the lines of business to tap data for specific objectives. Financial services firms, among the first to create such a position, have turned to CDOs to drive their data management strategy and establish a data governance structure to determine who owns and manages the information. Their experiences could be particularly instructive in a homeland security setting, given the vast array of data they collect, as well as their need to safeguard sensitive information. Indeed, this last consideration has proved problematic for DHS in the past; it s easier to protect information when security is at stake than risk exposing it to someone without the proper authorization. A critical part of the CDO s role would be to define the parameters for data ownership and stewardship. The CDO would also help determine legal restrictions on the use of data. When certain data are combined, it can create a collision of legal authorities. On its own, one piece of information may not be classified or law enforcement sensitive, but combining that information with other data may yield insights that need to be protected for national security or prosecutorial reasons. A strong governance function may also be influential in securing support from outside the organization. Whether the solution takes the form of a data lake or some other vehicle, it likely won t go far without a legislative mandate. The legacy structure of its seven operating components and other agencies has supported a view that information is a commodity that must be protected, and only disseminated on a need-to-know basis. The agency will also face the reality of convincing incoming political leaders to make short-term investments for long-term gains. Change 5

7 management is tough enough for private companies it is that much more difficult for federal agencies whose senior leaders are in a state of constant flux. Even the best-laid plans can get disrupted or derailed when those who call the shots inevitably change. Without a legislative or statutory mandate to serve as a forcing event, DHS will not likely be able to foment the degree of change that is needed at least not at an acceptable rate. In some ways, the position DHS finds itself in now is not dissimilar to that faced by the US Treasury Department in the aftermath of the credit crisis. At the time, it was clear that the financial services industry had major gaps in trying to get its hands around all of the risks being taken with the advent of credit default swaps and other advanced financial derivatives. The Treasury Department needed financial data that was actionable and would support decision-making at the highest levels within the department. To help fill these gaps, Congress created an Office of Financial Research (OFR) within the Treasury Department through the Wall Street Reform and Consumer Protection Act of 2010 ( Dodd-Frank ). The law created two units within OFR a data center and a research and analysis center to continually gather up and analyze detailed financial information collected from a variety of banks and other financial firms. One of its first steps was to issue a request for proposals on an industry utility to create and generate identification codes to help it obtain more granular data on counterparty risk, long and short positions, collateral and collateral calls, and derivative positions. Given the complexity involved with the effort, and the reliance on private sector contributions, OFR would not have been possible were it not provided for in statute. It may be too early to judge whether OFR will be a success or not, but it does show the power of a mandate to force organizational change where the availability of information is restricted. Conclusion: A Data-Driven Future The political feasibility of winning such a mandate for a data-driven approach at DHS is an open question. To win support for such a mandate, it will be critical that DHS and its components present the opportunity to be more effective and cost-efficient in real terms. DHS will continue to collect and store data regardless of whether such a mandate exists. The cost of those efforts will not go away. The question is whether DHS is empowered to make better use of those resources by increasing its awareness of the information that exists. After all, you can t fight an enemy you don t know. And, creating new channels to share information only works if you know what information you have at the ready. The enterprise insights that come from these early efforts will likely produce some quick victories and attract the necessary buy-in to build incrementally from there and start developing a data repository with actual answers not just questions. By thinking big, acting small, and going methodically step-by-step, DHS has the capability to lead where others continue to squabble. Information is the key to this transformation. Treated as a commodity, it will continue to be stockpiled and stored away. Viewed as an asset, it will strengthen the nation s homeland security enterprise and help DHS deliver on its many far-reaching mandates. Contacts Suzanne Storc Principal storc_suzanne@bah.com Mike Delurey Principal delurey_mike@bah.com 6

8 About Booz Allen Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. Today, Booz Allen is a leading provider of management and technology consulting services to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. In the commercial sector, the firm focuses on leveraging its existing expertise for clients in the financial services, healthcare, and energy markets, and to international clients in the Middle East. Booz Allen offers clients deep functional knowledge spanning strategy and organization, engineering and operations, technology, and analytics which it combines with specialized expertise in clients mission and domain areas to help solve their toughest problems. The firm s management consulting heritage is the basis for its unique collaborative culture and operating model, enabling Booz Allen to anticipate needs and opportunities, rapidly deploy talent and resources, and deliver enduring results. By combining a consultant s problem-solving orientation with deep technical knowledge and strong execution, Booz Allen helps clients achieve success in their most critical missions as evidenced by the firm s many client relationships that span decades. Booz Allen helps shape thinking and prepare for future developments in areas of national importance, including cybersecurity, homeland security, healthcare, and information technology. Booz Allen is headquartered in McLean, Virginia, employs approximately 25,000 people, and had revenue of $5.86 billion for the 12 months ended March 31, Fortune has named Booz Allen one of its 100 Best Companies to Work For for eight consecutive years. Working Mother has ranked the firm among its 100 Best Companies for Working Mothers annually since More information is available at (NYSE: BAH) To learn more about the firm and to download digital versions of this article and other Booz Allen Hamilton publications, visit 7

9 Principal Offices Huntsville, Alabama Sierra Vista, Arizona Los Angeles, California San Diego, California San Francisco, California Colorado Springs, Colorado Denver, Colorado District of Columbia Orlando, Florida Pensacola, Florida Sarasota, Florida Tampa, Florida Atlanta, Georgia Honolulu, Hawaii O Fallon, Illinois Indianapolis, Indiana Leavenworth, Kansas Aberdeen, Maryland Annapolis Junction, Maryland Hanover, Maryland Lexington Park, Maryland Linthicum, Maryland Rockville, Maryland Troy, Michigan Kansas City, Missouri Omaha, Nebraska Red Bank, New Jersey New York, New York Rome, New York Dayton, Ohio Philadelphia, Pennsylvania Charleston, South Carolina Houston, Texas San Antonio, Texas Abu Dhabi, United Arab Emirates Alexandria, Virginia Arlington, Virginia Chantilly, Virginia Charlottesville, Virginia Falls Church, Virginia Herndon, Virginia McLean, Virginia Norfolk, Virginia Stafford, Virginia Seattle, Washington The most complete, recent list of offices and their addresses and telephone numbers can be found on Use of DoD imagery does not constitute or imply endorsement Booz Allen Hamilton Inc. BA12-269

Utilizing and Visualizing Geolocation Data for Powerful Analysis

Utilizing and Visualizing Geolocation Data for Powerful Analysis Utilizing and Visualizing Geolocation Data for Powerful Analysis by Walton Smith smith_walton@bah.com Timothy Ferro ferro_timothy@bah.com Table of Contents Introduction... 1 Delivering Geolocation Data

More information

Supply Chain Data Standards in Healthcare

Supply Chain Data Standards in Healthcare Supply Chain Data Standards in Healthcare by Michael Zirkle zirkle_michael@bah.com Ryan Gallagher gallagher_ryan_b@bah.com Seth Rogier rogier_seth@bah.com Table of Contents Making Healthcare Safer and

More information

by Christopher P. Bell bell_christopher_p@bah.com Elizabeth Conjar conjar_elizabeth@bah.com

by Christopher P. Bell bell_christopher_p@bah.com Elizabeth Conjar conjar_elizabeth@bah.com Organizational Network Analysis Improving Intelligence and Information Sharing Capability among Homeland Security and Emergency Management Stakeholders by Christopher P. Bell bell_christopher_p@bah.com

More information

Analytical Program Management

Analytical Program Management Analytical Program Management Integrating Cost, Schedule, and Risk MISSION Analytical Program Management Integrating Cost, Schedule, and Risk Analytical Program Management 1 One of the greatest challenges

More information

The Social Financial Advisor: A Path Forward

The Social Financial Advisor: A Path Forward The Social Financial Advisor: A Path Forward Take the Right Route to Using Social Media by Chris Estes estes_chris@bah.com Todd Inskeep inskeep_todd@bah.com Getting Social Is It Time for Advisors to Face

More information

Ascent to the Cloud. Four Focus Areas for a Successful Enterprise Migration. by Michael Farber farber_michael@bah.com

Ascent to the Cloud. Four Focus Areas for a Successful Enterprise Migration. by Michael Farber farber_michael@bah.com Ascent to the Cloud Four Focus Areas for a Successful Enterprise Migration by Michael Farber farber_michael@bah.com Kevin Winter winter_kevin@bah.com Munjeet Singh singh_munjeet@bah.com Ascent to the

More information

Engaging Mobility in the Oil and Gas Sector

Engaging Mobility in the Oil and Gas Sector Engaging Mobility in the Oil and Gas Sector Engaging Mobility in the Oil and Gas Sector To open a dialogue about the impact of rapid mobile adoption in the energy industry, Booz Allen Hamilton, Bitzer

More information

Turning Big Data into Opportunity

Turning Big Data into Opportunity Turning Big Data into Opportunity The Data Lake by Mark Herman herman_mark@bah.com Michael Delurey delurey_mike@bah.com Table of Contents Introduction... 1 A New Mindset... 1 Ingesting Data into the Data

More information

Meeting the Challenges of the Modern CIO

Meeting the Challenges of the Modern CIO Meeting the Challenges of the Modern CIO by Darrin London, PMP london_darrin@bah.com Daniel E. Williams, PMP williams_daniel_2@bah.com Table of Contents Introduction...1 Challenges Faced by the Modern

More information

Data Lake-based Approaches to Regulatory- Driven Technology Challenges

Data Lake-based Approaches to Regulatory- Driven Technology Challenges Data Lake-based Approaches to Regulatory- Driven Technology Challenges How a Data Lake Approach Improves Accuracy and Cost Effectiveness in the Extract, Transform, and Load Process for Business and Regulatory

More information

Realizing the Promise of Health Information Exchange

Realizing the Promise of Health Information Exchange Realizing the Promise of Health Information Exchange by Timathie Leslie Leslie_Timathie@bah.com Realizing the Promise of Health Information Exchange Health information exchange (HIE) the electronic movement

More information

Enabling Cloud Analytics with Data-Level Security

Enabling Cloud Analytics with Data-Level Security Enabling Cloud Analytics with Data-Level Security Tapping the Full Value of Big Data and the Cloud by Jason Escaravage escaravage_jason@bah.com Peter Guerra guerra_peter@bah.com Table of Contents Introduction...

More information

Reimagining the Next Generation of Homeland Security

Reimagining the Next Generation of Homeland Security Reimagining the Next Generation of Homeland Security Table of Contents The Path Toward Resiliency........................................1 Adopting a Whole Community Approach to Resiliency. By re-thinking

More information

Developing a Business Case for Cloud

Developing a Business Case for Cloud Developing a Business Case for Cloud Analyzing Return on Investment for Cloud Alternatives May Yield Surprising Results by Paul Ingholt ingholt_paul@bah.com Cynthia O Brien o brien_cynthia@bah.com John

More information

Managing Risk in Global ICT Supply Chains

Managing Risk in Global ICT Supply Chains Managing Risk in Global ICT Supply Chains Best Practices and Standards for Acquiring ICT Ready for what s next. Managing Risk in Global ICT Supply Chains Emerging best practices and standards can significantly

More information

Realizing the Promise of Health Information Exchange

Realizing the Promise of Health Information Exchange Realizing the Promise of Health Information Exchange Realizing the Promise of Health Information Exchange Health information exchange (HIE) the electronic movement of health-related information among organizations

More information

How To Manage Security In A Federal System

How To Manage Security In A Federal System Security Authorization An Approach for Community Cloud Computing Environments by Perry Bryden bryden_perry@bah.com Daniel C. Kirkpatrick kirkpatrick_daniel@bah.com Farideh Moghadami moghadami_farideh@bah.com

More information

Effectiveness and Efficiency

Effectiveness and Efficiency Effectiveness and Efficiency Lessons for Building and Managing a Culture of Performance by Dave Mader mader_dave@bah.com Jay Dodd dodd_ joseph@bah.com Tom Miller miller_tom@bah.com Douglas Schlemmer schlemmer_douglas@bah.com

More information

Integrating IT Service Management Practices into the Defense Acquisition Lifecycle

Integrating IT Service Management Practices into the Defense Acquisition Lifecycle Integrating IT Service Management Practices into the Defense Acquisition Lifecycle by Francis Arambulo arambulo_francis@bah.com Michael Thompson thompson_michael_p@bah.com Table of Contents Introduction...1

More information

The Cybersecurity Executive Order

The Cybersecurity Executive Order The Cybersecurity Executive Order Exploiting Emerging Cyber Technologies and Practices for Collaborative Success by Mike McConnell mcconnell_mike@bah.com Sedar Labarre labarre_sedar@bah.com David Sulek

More information

Overcoming Deployment Challenges for Financial Crimes Platforms

Overcoming Deployment Challenges for Financial Crimes Platforms Overcoming Deployment Challenges for Financial Crimes Platforms by Brian Stoeckert stoeckert_brian@bah.com James Flowe flowe_james@bah.com Contents Introduction...1 Fragmented Approach to Fraud Prevention...1

More information

Harnessing Big Data to Solve Complex Problems: The Cloud Analytics Reference Architecture

Harnessing Big Data to Solve Complex Problems: The Cloud Analytics Reference Architecture Harnessing Big Data to Solve Complex Problems: The Cloud Analytics Reference Architecture Table of Contents Introduction... 1 Cloud Analytics Reference Architecture... 1 Using All the Data... 3 Better

More information

Booz Allen Cloud Solutions. Our Capability-Based Approach

Booz Allen Cloud Solutions. Our Capability-Based Approach Booz Allen Cloud Solutions Our Capability-Based Approach Booz Allen Cloud Solutions Our Capability-Based Approach Booz Allen Cloud Solutions Our Capability-Based Approach In today s budget-conscious environment,

More information

Overcoming Deployment Challenges for Financial Crimes Platforms

Overcoming Deployment Challenges for Financial Crimes Platforms Overcoming Deployment Challenges for Financial Crimes Platforms Convergent Risk Management for Financial Institutions Ready for what s next. Contents Introduction 1 Fragmented Approach to Fraud Prevention

More information

by Keith Catanzano catanzano_keith@bah.com

by Keith Catanzano catanzano_keith@bah.com Enhanced Training for a 21st-Century Military A convergence of new technologies and advanced learning techniques will help the military meet its growing training requirements, despite budget constraints

More information

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

How To Reduce Greenhouse Gas Emissions Through A Regional Performance Based Framework

How To Reduce Greenhouse Gas Emissions Through A Regional Performance Based Framework Miles to Go Before They're Green Reducing Surface Transportation Greenhouse Gas Emissions Through a Regional Performance-Based Framework by Gary Rahl Rahl_Gary@bah.com David Erne Erne_David@bah.com Victoria

More information

Fast Facts About The Cyber Security Job Market

Fast Facts About The Cyber Security Job Market Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing

More information

Information Security Governance

Information Security Governance Information Governance Government Considerations for the Cloud Computing Environment by Jamie Miller miller_jamie@bah.com Larry Candler candler_larry@bah.com Hannah Wald wald_hannah@bah.com Table of Contents

More information

Strategic Information Management Through Data Classification Reducing Corporate Risk and Cost by Gaining Control of Business Information Assets

Strategic Information Management Through Data Classification Reducing Corporate Risk and Cost by Gaining Control of Business Information Assets Strategic Information Management Through Data Classification Reducing Corporate Risk and Cost by Gaining Control of Business Information Assets by Glen Day day_glen@bah.com Strategic Information Management

More information

BIG SHIFTS WHAT S NEXT IN AML

BIG SHIFTS WHAT S NEXT IN AML Commercial Solutions Financial Crimes Commercial Solutions BIG SHIFTS WHAT S NEXT IN AML The next big shift in the fight against financial crime and money laundering is advanced machine learning and sophisticated

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

Job Market Intelligence:

Job Market Intelligence: March 2014 Job Market Intelligence: Report on the Growth of Cybersecurity Jobs Matching People & Jobs Reemployment & Education Pathways Resume Parsing & Management Real-Time Jobs Intelligence Average #

More information

Cyber Solutions Handbook

Cyber Solutions Handbook Cyber Solutions Handbook Making Sense of Standards and Frameworks by Matthew Doan doan_matthew@bah.com Ian Bramson bramson_ian@bah.com Laura Eise eise_laura@bah.com Cyber Solutions Handbook Making Sense

More information

Reimagining the Border A Functional View of Border Management

Reimagining the Border A Functional View of Border Management Reimagining the Border A Functional View of Border Management Reimagining the Border A Functional View of Border Management Globalization and international trade bring benefits as well as risks. To maximize

More information

Management Spans and Layers. Streamlining the Out-of-Shape Organization

Management Spans and Layers. Streamlining the Out-of-Shape Organization Management Spans and Layers Streamlining the Out-of-Shape Organization Originally published as: Management Spans and Layers: Streamlining the Out-of-Shape Organization, by Ian Buchanan, Jong Hyun Chang,

More information

U.S. Department of Homeland Security STATEMENT

U.S. Department of Homeland Security STATEMENT U.S. Department of Homeland Security STATEMENT OF PAUL M. KILCOYNE DEPUTY ASSISTANT DIRECTOR OF INVESTIGATIVE SERVICES DIVISION U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT U.S. DEPARTMENT OF HOMELAND SECURITY

More information

Enabling Agility in Law Enforcement Leveraging Collective Intelligence, Analytics, and Operational Capabilities to Optimize Mission Performance

Enabling Agility in Law Enforcement Leveraging Collective Intelligence, Analytics, and Operational Capabilities to Optimize Mission Performance Enabling Agility in Law Enforcement Leveraging Collective Intelligence, Analytics, and Operational Capabilities to Optimize Mission Performance Enabling Agility in Law Enforcement Leveraging Collective

More information

Rapid Prototyping. The Agile Creation of Solutions for Modern Defense & Intelligence. by Lee Wilbur wilbur_lee@bah.com

Rapid Prototyping. The Agile Creation of Solutions for Modern Defense & Intelligence. by Lee Wilbur wilbur_lee@bah.com Rapid Prototyping The Agile Creation of Solutions for Modern Defense & Intelligence by Lee Wilbur wilbur_lee@bah.com Allan Steinhardt steinhardt_allan@bah.com Rapid Prototyping The Agile Creation of Solutions

More information

Good afternoon. It is a pleasure to be joining you for the Predictive Analytics World for Government conference.

Good afternoon. It is a pleasure to be joining you for the Predictive Analytics World for Government conference. JENNIFER SHASKY CALVERY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK PREDICTIVE ANALYTICS WORLD FOR GOVERNMENT WASHINGTON, DC OCTOBER 13, 2015 Good afternoon. It is a pleasure to be joining you for the

More information

SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014

SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014 SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014 EXECUTIVE SUMMARY In this digital age, social media has quickly become one of the most important communication channels. The shift to online conversation

More information

Massive Data Analytics and the Cloud A Revolution in Intelligence Analysis

Massive Data Analytics and the Cloud A Revolution in Intelligence Analysis Massive Data Analytics and the Cloud A Revolution in Intelligence Analysis by Michael Farber farber_michael@bah.com Mike Cameron cameron_mike@bah.com Christopher Ellis ellis_christopher@bah.com Josh Sullivan,

More information

Cyber Training. Developing the Next Generation of Cyber Analysts. Ready for what s next.

Cyber Training. Developing the Next Generation of Cyber Analysts. Ready for what s next. Cyber Training Developing the Next Generation of Cyber Analysts Ready for what s next. Table of Contents The Crisis Moment...1 The Cyber Skills Gap...1 Developing a World-Class Cyber Workforce...2 Emulating

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

Next-Generation Governance Enhanced Decisionmaking Through a Mission-Focused, Data-Driven Approach

Next-Generation Governance Enhanced Decisionmaking Through a Mission-Focused, Data-Driven Approach Next-Generation Governance Enhanced Decisionmaking Through a Mission-Focused, Data-Driven Approach April 2011 A white paper prepared by Booz Allen Hamilton: Center of Excellence for Strategic Technology

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations

More information

Confronting Complexity in Managing a Cyber Crisis Lessons Learned for Responding at Network Speed

Confronting Complexity in Managing a Cyber Crisis Lessons Learned for Responding at Network Speed Confronting Complexity in Managing a Cyber Crisis Lessons Learned for Responding at Network Speed by Admiral Mike McConnell, USN, Retired Senior Executive Advisor, Former Vice Chairman Former Director

More information

OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.

OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. OPTIMUS SBR CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. Optimizing Results with Business Intelligence Governance This paper investigates the importance of establishing a robust Business Intelligence (BI)

More information

The Economics of Cloud Computing

The Economics of Cloud Computing The Economics of Cloud Computing Addressing the Benefits of Infrastructure in the Cloud by Ted Alford alford_theodore@bah.com Gwen Morton morton_gwen@bah.com The Economics of Cloud Computing Addressing

More information

Think Outside Your ERP Mission-Focused Inventory Strategies

Think Outside Your ERP Mission-Focused Inventory Strategies Think Outside Your ERP Mission-Focused Inventory Strategies by Ray Haeme haeme_ray@bah.com Margo Cohen cohen_margo@bah.com Eric Michlowitz michlowitz_eric@bah.com Think Outside Your ERP Mission-Focused

More information

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK REMARKS AT THE PARLIAMENTARY INTELLIGENCE SECURITY FORUM JUNE 20, 2016 VIENNA, AUSTRIA Good morning. I would like to thank Congressman

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014

SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014 SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014 Our Understanding The rise of social media has transformed the way citizens engage with their government. Each day, nearly 2 billion people talk about and

More information

Logistics Engineering Perspective Enabling Logistics Transformation While Reducing Costs

Logistics Engineering Perspective Enabling Logistics Transformation While Reducing Costs Logistics Engineering Perspective Enabling Logistics Transformation While Reducing Costs by Mike Jones Jones_Mike@bah.com Dick Lohrmann Lohrmann_Dick@bah.com Tim Surabian Surabian_Timothy@bah.com Logistics

More information

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who

More information

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA White Paper Achieving HIPAA Compliance through Security Information Management White Paper / HIPAA Contents Executive Summary... 1 Introduction: Brief Overview of HIPAA... 1 The HIPAA Challenge: Protecting

More information

Pulling Up Your SOX. Companies Can Gain from Compliance with U.S. Governance Act. Lisa Fabish fabish_lisa@bah.com. Stuart Groves groves_stuart@bah.

Pulling Up Your SOX. Companies Can Gain from Compliance with U.S. Governance Act. Lisa Fabish fabish_lisa@bah.com. Stuart Groves groves_stuart@bah. by Lisa Fabish fabish_lisa@bah.com Stuart Groves groves_stuart@bah.com Robert Oushoorn oushoorn_robert@bah.com Otto Waterlander waterlander_otto@bah.com Pulling Up Your SOX Companies Can Gain from Compliance

More information

IBM Software A Journey to Adaptive MDM

IBM Software A Journey to Adaptive MDM IBM Software A Journey to Adaptive MDM What is Master Data? Why is it Important? A Journey to Adaptive MDM Contents 2 MDM Business Drivers and Business Value 4 MDM is a Journey 7 IBM MDM Portfolio An Adaptive

More information

Department of Homeland Security Information Sharing Strategy

Department of Homeland Security Information Sharing Strategy Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction

More information

DEPARTMENT OF HOMELAND SECURITY

DEPARTMENT OF HOMELAND SECURITY DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $43.2 billion, an increase of $309 million above the 2010 enacted level. Increases were made in core homeland security functions such as border

More information

The Digital Enterprise. Connecting Our Citizens, Warriors, and Workforce

The Digital Enterprise. Connecting Our Citizens, Warriors, and Workforce The Digital Enterprise Connecting Our Citizens, Warriors, and Workforce Tapping into the Digital Ecosystem enables endless possibilities for innovation within the federal government. The Digital Ecosystem

More information

The Essential Engineering Partner. From Serendipitous Development to Strategic Growth. By Joseph Sifer, Executive Vice President sifer_joseph@bah.

The Essential Engineering Partner. From Serendipitous Development to Strategic Growth. By Joseph Sifer, Executive Vice President sifer_joseph@bah. The Essential Engineering Partner From Serendipitous Development to Strategic Growth By Joseph Sifer, Executive Vice President sifer_joseph@bah.com The Essential Engineering Partner From Serendipitous

More information

Issue Brief: The Movement of Illegal Guns Across the U.S.-Mexico Border

Issue Brief: The Movement of Illegal Guns Across the U.S.-Mexico Border Issue Brief: The Movement of Illegal Across the U.S.-Mexico Border A Report by Mayors Against Illegal September 010 www.mayorsagainstillegal.org Summary In recent years, the escalating drug cartel violence

More information

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events

More information

Current Challenges. Predictive Analytics: Answering the Age-Old Question, What Should We Do Next?

Current Challenges. Predictive Analytics: Answering the Age-Old Question, What Should We Do Next? Predictive Analytics: Answering the Age-Old Question, What Should We Do Next? Current Challenges As organizations strive to meet today s most pressing challenges, they are increasingly shifting to data-driven

More information

Enterprise Data Management for SAP. Gaining competitive advantage with holistic enterprise data management across the data lifecycle

Enterprise Data Management for SAP. Gaining competitive advantage with holistic enterprise data management across the data lifecycle Enterprise Data Management for SAP Gaining competitive advantage with holistic enterprise data management across the data lifecycle By having industry data management best practices, from strategy through

More information

Intelligent Systems: Unlocking hidden business value with data. 2011 Microsoft Corporation. All Right Reserved

Intelligent Systems: Unlocking hidden business value with data. 2011 Microsoft Corporation. All Right Reserved Intelligent Systems: Unlocking hidden business value with data Intelligent Systems 2 Microsoft Corporation September 2011 Applies to: Windows Embedded Summary: An intelligent system enables data to flow

More information

HARNESSING BIG DATA WITHIN THE FEDERAL GOVERNMENT FINDINGS AND RECOMMENDATIONS OF ATARC S BIG DATA INNOVATION LAB DECEMBER, 2015

HARNESSING BIG DATA WITHIN THE FEDERAL GOVERNMENT FINDINGS AND RECOMMENDATIONS OF ATARC S BIG DATA INNOVATION LAB DECEMBER, 2015 HARNESSING BIG DATA WITHIN THE FEDERAL GOVERNMENT FINDINGS AND RECOMMENDATIONS OF ATARC S BIG DATA INNOVATION LAB DECEMBER, 2015 ATARC Big Data Innovation Lab Sponsors ATARC Big Data Innovation Lab Objective

More information

Tackling the BRAC Mission Continuity Challenge Workforce

Tackling the BRAC Mission Continuity Challenge Workforce Tackling the BRAC Mission Continuity Challenge Workforce by Joseph W. Mahaffee mahaffee_ joe@bah.com Dr. William Rowe, Jr. rowe_william_ jr@bah.com Elizabeth Miller miller_elizabeth@bah.com Tackling the

More information

The People Pronouncement

The People Pronouncement The People Pronouncement Real Hiring Reform Comes to Washington by Jeff Pon pon_ jeff@bah.com Ron Sanders sanders_ron@bah.com Eric Vazquez vazquez_eric@bah.com The People Pronouncement Real Hiring Reform

More information

Executive Summary: The Comprehensive Impact of Offshore IT Software and Services Outsourcing on the U.S. Economy and the IT Industry

Executive Summary: The Comprehensive Impact of Offshore IT Software and Services Outsourcing on the U.S. Economy and the IT Industry Executive Summary: The Comprehensive Impact of Offshore IT Software and Services Outsourcing on the U.S. Economy and the IT Industry SPONSORED BY: Information Technology Association of America 1401 Wilson

More information

Jabil builds momentum for business analytics

Jabil builds momentum for business analytics Jabil builds momentum for business analytics Transforming financial analysis with help from IBM and AlignAlytics Overview Business challenge As a global electronics manufacturer and supply chain specialist,

More information

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC) Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,

More information

District of Columbia State Data Center Quarterly Report Summer 2007

District of Columbia State Data Center Quarterly Report Summer 2007 District of Columbia State Data Center Quarterly Report Summer 2007 Commuting to Work: Bike? Walk? Drive? Introduction by Joy Phillips Robert Beasley In 2005, 45 percent of District residents drove to

More information

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee

More information

EMPOWERING SMART DECISION-MAKING THROUGH SMART DATA

EMPOWERING SMART DECISION-MAKING THROUGH SMART DATA EMPOWERING SMART DECISION-MAKING THROUGH SMART DATA RECENT BIG DATA INITIATIVES HAVE DRIVEN AGENCIES TO INVEST IN NEW TECHNOLOGIES AND METHODS TO ENHANCE COMPUTING POWER AND INSIGHTS GENERATED BY BIG DATA.

More information

Turning Optimism into Reality: How Big Data Is Transforming Government

Turning Optimism into Reality: How Big Data Is Transforming Government Turning Optimism into Reality: How Big Data Is Transforming Government A Candid Survey of Federal Employees Underwritten by: March 2013 About The Research Intelligence Division Of Government Executive

More information

What Does Big Data Mean to You? NASACT 2015

What Does Big Data Mean to You? NASACT 2015 What Does Big Data Mean to You? NASACT 2015 August 25, 2015 2013 McGladrey LLP. All Rights Reserved. 2013 McGladrey LLP. All Rights Reserved. Presenters Ernie Almonte Partner, Assurance Services McGladrey

More information

The Federal Government s Key Role in Healthcare Innovation

The Federal Government s Key Role in Healthcare Innovation The Federal Government s Key Role in Healthcare Innovation by Lucy Stribley Stribley_lucy@bah.com Lisa Egbuonu-Davis, MD Egbuonu-davis_lisa@bah.com Patrick Fritz Fritz_patrick@bah.com The Federal Government

More information

Developing a Mature Security Operations Center

Developing a Mature Security Operations Center Developing a Mature Security Operations Center Introduction Cybersecurity in the federal government is at a crossroads. Each month, there are more than 1.8 billion attacks on federal agency networks, and

More information

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

GETTING REAL ABOUT SECURITY MANAGEMENT AND BIG DATA GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats

More information

A BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper

A BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper A BUSINESS CASE FOR BEHAVIORAL ANALYTICS White Paper Introduction What is Behavioral 1 In a world in which web applications and websites are becoming ever more diverse and complicated, running them effectively

More information

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE

More information

SEYMOUR SLOAN IDEAS THAT MATTER

SEYMOUR SLOAN IDEAS THAT MATTER SEYMOUR SLOAN IDEAS THAT MATTER The value of Big Data: How analytics differentiate winners A DATA DRIVEN FUTURE Big data is fast becoming the term keeping senior executives up at night. The promise of

More information

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government

More information

INTRODUCTORY NOTE TO THE G20 ANTI-CORRUPTION OPEN DATA PRINCIPLES

INTRODUCTORY NOTE TO THE G20 ANTI-CORRUPTION OPEN DATA PRINCIPLES INTRODUCTORY NOTE TO THE G20 ANTI-CORRUPTION OPEN DATA PRINCIPLES Open Data in the G20 In 2014, the G20 s Anti-corruption Working Group (ACWG) established open data as one of the issues that merit particular

More information

OPEN SOURCE INFORMATION ACQUISITION, ANALYSIS, AND INTEGRATION IN THE IAEA DEPARTMENT OF SAFEGUARDS 1

OPEN SOURCE INFORMATION ACQUISITION, ANALYSIS, AND INTEGRATION IN THE IAEA DEPARTMENT OF SAFEGUARDS 1 JAMES MARTIN CENTER FOR NONPROLIFERATION STUDIES Twentieth Anniversary Celebration: The Power and Promise of Nonproliferation Education and Training December 3-5, 2009 OPEN SOURCE INFORMATION ACQUISITION,

More information

The Cloud for Insights

The Cloud for Insights The Cloud for Insights A Guide for Small and Midsize Business As the volume of data grows, businesses are using the power of the cloud to gather, analyze, and visualize data from internal and external

More information

Statement of John Sammon. Assistant Administrator for. Transportation Sector Network Management. Transportation Security Administration

Statement of John Sammon. Assistant Administrator for. Transportation Sector Network Management. Transportation Security Administration Statement of John Sammon Assistant Administrator for Transportation Sector Network Management Transportation Security Administration U.S. Department of Homeland Security Before the United States House

More information

Impacts of Sequestration on the States

Impacts of Sequestration on the States Impacts of Sequestration on the States Alabama Alabama will lose about $230,000 in Justice Assistance Grants that support law STOP Violence Against Women Program: Alabama could lose up to $102,000 in funds

More information

IBM Executive Point of View: Transform your business with IBM Cloud Applications

IBM Executive Point of View: Transform your business with IBM Cloud Applications IBM Executive Point of View: Transform your business with IBM Cloud Applications Businesses around the world are reinventing themselves to remain competitive in a time when disruption is the new normal.

More information

Accenture CAS: Solution Implementation Making change happen

Accenture CAS: Solution Implementation Making change happen Accenture CAS: Solution Implementation Making change happen Rooted in a strong culture of client service and success, our smart, committed and experienced professionals collaborate as global teams to create

More information

Booz Allen Hamilton Systems Delivery Group

Booz Allen Hamilton Systems Delivery Group Booz Allen Hamilton Systems Delivery Group Booz Allen Hamilton Systems Delivery Group Systems Delivery at Booz Allen In today s environment, large software projects routinely run significantly over budget

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

Environmentally Friendly Technology

Environmentally Friendly Technology During these tough economic times, companies are looking for ways to save. This and the corporate push for greener technology have influenced the surge in thin client deployment. This whitepaper explains

More information

Ten Mistakes to Avoid

Ten Mistakes to Avoid EXCLUSIVELY FOR TDWI PREMIUM MEMBERS TDWI RESEARCH SECOND QUARTER 2014 Ten Mistakes to Avoid In Big Data Analytics Projects By Fern Halper tdwi.org Ten Mistakes to Avoid In Big Data Analytics Projects

More information

The Economics of Cloud Computing

The Economics of Cloud Computing The Economics of Cloud Computing Addressing the Benefits of Infrastructure in the Cloud by Ted Alford alford_theodore@bah.com Gwen Morton morton_gwen@bah.com The Economics of Cloud Computing Addressing

More information

How To Manage Big Data

How To Manage Big Data The Data Lake: Taking Big Data Beyond the Cloud by Mark Herman Executive Vice President Booz Allen Hamilton Michael Delurey Principal Booz Allen Hamilton The bigger that big data gets, the more it seems

More information