DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO"

Transcription

1 DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO

2 Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes Strengthen Workforce Requires Partnerships Across DoD to achieve Improved mission effectiveness and user satisfaction Reduced costs Improved cyber security and interoperability Agile, faster, and responsive delivery of IT capabilities Enabling Agile, Secure, Efficient, and Effective DoD IT 2

3 Information Technology is Central to DoD Missions 3

4 Current DoD IT Environment Hundreds of suboptimal data centers and networks incur unnecessary costs IT Programs average 81 Months* cannot rapidly and efficiently field new technology to meet warfighter ource: Defense Science Board needs Limited interoperability reduces information sharing and mission collaboration Increasing demand for new technology on rapidly evolving devices Cyber security vulnerabilities threaten to exploit classified information and endanger our national security Current IT delivery process hinders our ability to take advantage of new commercial technology4

5 DOD IT MODERNIZATION CONSOLIDATE INFRASTRUCTU RE STREAMLINE PROCESSES 1. Consolidate Enterprise Networks 4. Enable Agile IT 5. Strengthen IT Governance 2. Deliver DoD Enterprise Cloud 6. Strategic Sourcing for IT Commodities 7. Strengthen Cyber Security STRENGTHEN WORKFORCE 10. Modernize IT Guidance and Training $ 3. Standardize IT Platforms 8. Strengthen IT Investments 9. Improve Enterprise Arch Effectiveness 5

6 1. Consolidate Enterprise Networks Consolidate Data Centers Consolidate Network Operations Centers Optimize to a Joint Enterprise Architecture with Secure Access <

7 2. Deliver DoD Enterprise Cloud Leverage commercial clouds that meet cyber security requirements Commercial Cloud DoD Cloud Develop and execute a strategy and standards for a cyber-secure DoD cloud environment 7

8 3. Standardize IT Platforms Minimize program-unique platforms Apps Apps Apps Services Services Services Infrastruct ure Infrastruct ure Infrastruct ure Program A Program B Program C Design platforms that support a cyber-secure environment Apps Apps Apps Apps Store Common Platform Comm (Possibly PaaS) on Common Infrastructure (Possibly (Identity / Access, Data IaaS) Messaging, etc) (Facilities, Transport, Processing, Storage, etc) Drive DoD use of standard platforms 8

9 4. Enable Agile IT Active user involvement Deliver usable capabilities to users every 6-12 months to prioritize requirements and provide responsive feedback during development A different approach to project management Small, dynamic, and empowered teams Roadmaps and architectures align agile increments into larger capabilities Small scoped releases responsive to changes in ops, tech, budget... Streamlined contracting processes Leveraging common leveraging existing infrastructure contract vehicles for platforms, rapid 9 Task/Delivery standards, and interfaces Order execution Integrated test and evaluation, certifications during development leveraging common test infrastructure, automated tools 9

10 5. Strengthen IT Governance Enable Agile, Networked Force IT Governance Prioritize IT Capabilities Prioritize IT Investments Restructure IT governance boards for Enterprise view Prioritize IT Technologies Strategic Planning Requirements Budget Acquisition Streamline compliance processes 10

11 6. Leverage Strategic Sourcing for IT Commodities Enterprise approach for procuring common IT hardware and software Establish a DoD Commodity Council 11

12 7. Strengthen Cybersecurity Develop enterprise cyber situational awareness, including authentication Leverage automated tools and continual assessments Streamline certification and reinforce reciprocity 12

13 8. Strengthen IT Investments $ Obtain transparency of IT investments $ Align IT Investments to DoD strategies Review performance of major investments 13

14 9. Improve Enterprise Architecture Effectiveness Transition from compliance-based process to supporting IT investment decisions Develop EA Implementation Plan and Instruction 14

15 10. Modernize IT Guidance and Training Modernize IT Acquisition Education and Training Develop Career Roadmaps For IT Acquisition Personnel Implement DoD IT Acquisition Workforce Strategic Plan Guide Adoption of Agile IT Practices Create robust IT Acquisition Communities 15

16 Benefits of Successful IT Modernization Increase mission effectiveness Strengthen cyber security Improve outcomes of IT Acquisition Faster capability deliveries Improve interoperability Save billions through cost efficiencies 16

17 Alignment with Other Initiatives Internal Initiatives IT Modernization Platform: IT Consolidation IT Enterprise Strategy Roadmap DoD Information Enterprise Strategic Plan DoD CIO Campaign Plan Enterprise Architecture DoD CIO Strategic Workforce Plan 1. Consolidate enterprise networks 2. Deliver DoD Enterprise Cloud 3. Standardize IT platforms Processes: Streamline Delivery of IT Capabilities 4. Enable Agile IT 5. Strengthen IT governance 6. Strategic sourcing for IT commod. 7. Strengthen Cyber Security 8. Streamline Compliance Processes 9. Improve Enterprise Architecture Workforce: Strengthen IT Community 10.Modernize IT guidance, training External Initiatives AT&L Better Buying Power Section 804 IT Acquisition Reform Section 933 Cyber Acquisition Reform Federal CIO 25-Point Plan 17

18 IT Modernization Roadmap February March April May Finalize Strategy Strategy Rollout MILDEP CIOs TBD DoD EA30Conference DoD CIO Executive Board TBD CIO All-Hands 14 Roll out Prep Communicate Strategy Industry and Media Engagements (Tech America, AFCEA, NDIA, etc.) One on One Stakeholder Engagements 1 Execute IT Modernization NDAA Inputs Due Internal DoD CIO 14 SharePoint IT Mod on DoD CIO IT Modernization Website Public Website TBD Publish Agile IT 31 Coordinate Agile IT Handbook (AT&L & DCMO) Handbook Draft Policy Memos (DTMs) TODAY Coordinate DTMs Sign TBD 1 2 DTMs 18

19 POTUS: DoD Will Be Agile efense Security Review, 5 Jan 12 The United States is going to maintain our military superiority with armed forces that are agile, flexible and ready for the full range of contingencies and threats. - President Obama The US joint force will be smaller and leaner. But its great strength will be that it will be more agile, more flexible, ready to deploy quickly, innovative, and technologically advanced. That is the force for the future. - Secretary Panetta 19

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality

More information

DoD ESI & The Joint Information Environment (JIE)

DoD ESI & The Joint Information Environment (JIE) DoD ESI & The Joint Information Environment (JIE) DISA Mission Partners Conference 2012 May 7, 2012 www.esi.mil Agenda DoD ESI Overview Economies of Scale for COTS IT Acquisition Alignment with JIE & DoD

More information

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE

More information

Core Data Center Reference Architecture

Core Data Center Reference Architecture Core Data Center Reference Architecture DoD Enterprise Architecture Conference 2012 Office of the Chief Information Officer Topics Background DoD CIO Vision for Core Data Centers Core Data Center Reference

More information

DoD Software Assurance (SwA) Overview

DoD Software Assurance (SwA) Overview DoD Software Assurance (SwA) Overview Tom Hurt Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Program Protection Summit / Workshop McLean, VA May 19, 2014 May 19, 2014

More information

DoD CIO ITSM Overview Enterprise Architecture Conference

DoD CIO ITSM Overview Enterprise Architecture Conference DoD CIO ITSM Overview Enterprise Architecture Conference April 14, 2011 Barbara McCain Enterprise Architecture & Infrastructure DoD CIO Barbara.McCain@osd.mil What is IT Service Management (ITSM)? ITSM

More information

Empowering IT Acquisitions

Empowering IT Acquisitions Empowering IT Acquisitions Public Release 66ABG-2015-0081 Tim Rudolph, Ph.D. AFLCMC Chief Technology Officer AF Tech Advisor, Integrated Information Capabilities 21 May 2015 The Point Value Deployed Rapidly

More information

Cloud Computing Strategy

Cloud Computing Strategy Department of Defense Chief Information Officer Cloud Computing Strategy July 2012 This page intentionally left blank EXECUTIVE SUMMARY In the current political, economic, and technological landscape,

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

United States Department of Defense

United States Department of Defense Defense.gov News Release: DOD Releases Cloud Computing Str... http://www.defense.gov/releases/release.aspx?releaseid=15435 1 of 3 7/11/2012 3:57 PM United States Department of Defense TOP LINKS Subscribe

More information

The DoD Information Enterprise Strategic Plan and Roadmap (SP&R)

The DoD Information Enterprise Strategic Plan and Roadmap (SP&R) The DoD Information Enterprise Strategic Plan and Roadmap (SP&R) A collaborative planning approach for the Information Enterprise Jun 1-4, 2009 Lloyd Thrower lloyd.thrower@osd.mil DoD CIO Strategic Planning

More information

DHS IT Successes. Rationalizing Our IT Infrastructure

DHS IT Successes. Rationalizing Our IT Infrastructure TESTIMONY OF Richard A. Spires Chief Information Officer U.S. Department of Homeland Security Before the House Committee on Oversight and Government Reform February 27, 2013 Chairman Issa, Ranking Member

More information

Statement. Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation. Before

Statement. Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation. Before Statement of Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation Before THE UNITED STATES SENATE ARMED SERVICES COMMITTEE (SUBCOMMITTEE ON READINESS AND MANAGEMENT SUPPORT)

More information

Cloud Computing Strategy

Cloud Computing Strategy Department of Defense Chief Information Officer Cloud Computing Strategy July 2012 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is

More information

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,

More information

Enhancing Adoption of Agile Software Development in DoD [To Improve Acquisition Outcomes] September 22-23, 2015

Enhancing Adoption of Agile Software Development in DoD [To Improve Acquisition Outcomes] September 22-23, 2015 Enhancing Adoption of Agile Software Development in DoD [To Improve Acquisition Outcomes] September 22-23, 2015 Don Johnson Office of the Secretary of Defense USD(AT&L) DASD(C3, Cyber & Business System)

More information

Strategic Plan

Strategic Plan 2013-2016 Strategic Plan Office for Information Technology Message from the Chief Information Officer Shortly after Governor Corbett took office in 2011, the Office of Administration/Office for Information

More information

CIOs: How to Become the CEO s Business Partner

CIOs: How to Become the CEO s Business Partner CIOs: How to Become the CEO s Business Partner A Best Practices ebook Nicolas Betbeder-Matibet, Managing Director, MEGA Asia - The Agenda for CIOs in 2012 According to Gartner*: CIO strategies concentrate

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

Introduction to NICE Cybersecurity Workforce Framework

Introduction to NICE Cybersecurity Workforce Framework Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,

More information

Agency for State Technology

Agency for State Technology Agency for State Technology 2015-2018 Statewide Information Technology Security Plan The Way Forward Rick Scott, Governor Jason M. Allison, State CIO Table of Contents From the Desk of the State Chief

More information

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS Steve Mills DAU-South 1 Overview Questions Cybersecurity Owners and Stakeholders Cybersecurity Why It Matters to DoD Program Managers Defense Science

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Small Business. Leveraging SBA IT resources to support America s small businesses

Small Business. Leveraging SBA IT resources to support America s small businesses Small Business Administration Information Technology Strategic Plan ( ITSP) 2012-2016 Leveraging SBA IT resources to support America s small businesses Message from the Chief Information Officer The Small

More information

FY 2012 Information Technology Budget

FY 2012 Information Technology Budget FY 2012 Information Technology Budget Cutting What We Cannot Afford & Deploying Game-Changing Technologies Vivek Kundra U.S. Chief Information Officer www.whitehouse.gov The Technology Agenda Cutting What

More information

FROM THE DOD CIO. Teresa M. Takai, DoD CIO

FROM THE DOD CIO. Teresa M. Takai, DoD CIO FROM THE DOD CIO The challenge of managing information technology (IT) within the Department of Defense has never been greater. The Department s mission continues to expand to encompass military, peacekeeper,

More information

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT IntelliDyne, LLC MARCH 2012 STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

More information

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee

More information

Defining a Secure Mobile Framework Architecture at DHA

Defining a Secure Mobile Framework Architecture at DHA Ms. Janine Oakley, Transition Manager Innovation and Advanced Technology Development Division 2015 Defense Health Information Technology Symposium Defining a Secure Mobile Framework Architecture at DHA

More information

Transforming the Marketplace: Simplifying Federal Procurement to Improve Performance, Drive Innovation, and Increase Savings

Transforming the Marketplace: Simplifying Federal Procurement to Improve Performance, Drive Innovation, and Increase Savings EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 OFFICE OF FEDERAL PROCUREMENT POLICY December 4, 2014 MEMORANDUM FOR CHIEF ACQUISITION OFFICERS SENIOR PROCUREMENT

More information

The Scottish Wide Area Network Programme

The Scottish Wide Area Network Programme The Scottish Wide Area Network Release: Issued Version: 1.0 Date: 16/03/2015 Author: Andy Williamson Manager Owner: Anne Moises SRO Client: Board Version: Issued 1.0 Page 1 of 8 16/04/2015 Document Location

More information

Briefing to the AFCEA International Cyber Symposium

Briefing to the AFCEA International Cyber Symposium Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial

More information

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY

More information

Program Protection and Anti-Tamper

Program Protection and Anti-Tamper Program Protection and Anti-Tamper Kristen Baldwin Principal Deputy Office of the Deputy Assistant Secretary of Defense for Systems Engineering (DASD(SE)), OUSD(AT&L) NDIA Industrial Committee on Program

More information

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service Cloud Computing Best Practices Cloud Computing Best Practices Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service Overview Cloud Computing

More information

AFCEA JIE Mission Partner Symposium

AFCEA JIE Mission Partner Symposium AFCEA JIE Mission Partner Symposium Success with JIE Industry Contracts in DoD Enterprise Services Lessons Learned and Tips for Future Success Victor Akinnagbe Victor.a@microsoft.com 425-704-9149 Defense

More information

RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED

RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED Cybersecurity and the Risk Management Framework Wherewe ve been and where we re going Information Assurance DoD Instruction 8500.01,Para 1(d),adoptsthe term cybersecurity as it is defined in National Security

More information

Department of Defense Fiscal Year (FY) 2016 President's Budget Submission

Department of Defense Fiscal Year (FY) 2016 President's Budget Submission Department of Defense Fiscal Year (FY) 2016 President's Budget Submission February 2015 Defense Contract Management Agency Defense Wide Justification Book Volume 5 of 5 Research,, Test & Evaluation, Defense-Wide

More information

Cybersecurity Enhancement Account. FY 2017 President s Budget

Cybersecurity Enhancement Account. FY 2017 President s Budget Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities

More information

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE SCIENCE, SPACE AND TECHNOLOGY COMMITTEE SUBCOMMITTEE

More information

Enterprise SOA Strategy, Planning and Operations with Agile Techniques, Virtualization and Cloud Computing

Enterprise SOA Strategy, Planning and Operations with Agile Techniques, Virtualization and Cloud Computing Enterprise SOA Strategy, Planning and Operations with Agile Techniques, Virtualization and Cloud Computing Presented by : Ajay Budhraja, Chief, Enterprise Services ME (Engg), MS (Mgmt), PMP, CICM, CSM,

More information

DoD Joint Information Enterprise

DoD Joint Information Enterprise DoD CIO DoD Joint Information Enterprise Mr. David DeVries DoD Deputy Chief Information Officer For Information Enterprise (IE) May 21, 2013 DoD s Cyber Footprint How Big? DoD IT User Base ~1.4 million

More information

DOD BUSINESS SYSTEMS MODERNIZATION. Additional Action Needed to Achieve Intended Outcomes

DOD BUSINESS SYSTEMS MODERNIZATION. Additional Action Needed to Achieve Intended Outcomes United States Government Accountability Office Report to Congressional Committees July 2015 DOD BUSINESS SYSTEMS MODERNIZATION Additional Action Needed to Achieve Intended Outcomes GAO-15-627 July 2015

More information

System Security Engineering

System Security Engineering A Critical Discipline of SE Ms. Kristen Baldwin Director, Systems Analysis DDR&E/Systems Engineering 12th Annual NDIA Systems Engineering Conference 28 October 2009 10/28/09 Page-1 Defense Research & Engineering

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

IRM FY2014 2018. Information Resources Management Strategic Plan

IRM FY2014 2018. Information Resources Management Strategic Plan IRM FY2014 2018 Information Resources Management Strategic Plan DOE IRM Mission Advance the Department s mission through policy, standards, and services, which meet mission requirements, balance risk and

More information

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922.

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922. CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -

More information

SMART LEAN GOVERNMENT NASCIO. Direction, State Experiences and Federated Identity Management. April 29, 2014

SMART LEAN GOVERNMENT NASCIO. Direction, State Experiences and Federated Identity Management. April 29, 2014 SMART LEAN GOVERNMENT NASCIO Direction, State Experiences and Federated Identity Management April 29, 2014 Eric Sweden, Program Director, Enterprise Architecture & Governance Overview Enterprise.... Federation....

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent

Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent Cloud Security A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud Sean Curry Sales Executive, Aquilent The first in a series of audits DoD did not fully execute elements of the July 2012

More information

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative Strategic Plan 2015-2017 state of south dakota Bureau of Information & Telecommunications 1GOAL ONE: Provide a Reliable, Secure & Modern Infrastructure services security technology assets well-designed

More information

STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE

STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTE

More information

DoD Strategy for Defending Networks, Systems, and Data

DoD Strategy for Defending Networks, Systems, and Data DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July

More information

SAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT

SAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT SAM Benefits Overview SAM SAM is critical to managing an IT environment because effectiveness is seriously compromised when an organization doesn t know what software assets it has, where they are located,

More information

Protecting Applications on Microsoft Azure against an Evolving Threat Landscape

Protecting Applications on Microsoft Azure against an Evolving Threat Landscape Protecting Applications on Microsoft Azure against an Evolving Threat Landscape So, your organization has chosen to move to Office 365. Good choice. But how do you implement it? Find out in this white

More information

Information Technology Strategic Plan 2014-2017

Information Technology Strategic Plan 2014-2017 Information Technology Strategic Plan 2014-2017 Leveraging information technology to create a competitive advantage for UW-Green Bay Approved December 2013 (Effective January 2014 December 2017) Contents

More information

Forecast to Industry 2015

Forecast to Industry 2015 Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:

More information

2015 ANNUAL REPORT CHIEF INFORMATION OFFICER UNIVERSITY OF VIRGINIA

2015 ANNUAL REPORT CHIEF INFORMATION OFFICER UNIVERSITY OF VIRGINIA Summary In FY2014-15, goals for the CIO areas were aligned around two areas: the Cornerstone Plan (particularly Pillar V, Organizational Excellence, and Pillar II, Research Infrastructure and Services)

More information

Bid & Proposal Cost: How can Government and Industry work to get Better Bang for your Buck?

Bid & Proposal Cost: How can Government and Industry work to get Better Bang for your Buck? Bid & Proposal Cost: How can Government and Industry work to get Better Bang for your Buck? Breakout Session #: F05 Presented by: Gail Guseman Deloitte Consulting, LLP Date: July 23, 2013 Time: 4:00 pm

More information

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR OPTIMIZING BUSINESS PROCESS MANAGEMENT IN GOVERNMENT

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR OPTIMIZING BUSINESS PROCESS MANAGEMENT IN GOVERNMENT WHITE PAPER: STRATEGIC IMPACT PILLARS FOR OPTIMIZING BUSINESS PROCESS MANAGEMENT IN GOVERNMENT IntelliDyne, LLC MARCH 2012 Strategic Impact Pillars for Optimizing Business Process Management in Government

More information

A Year in Review: Outcomes and Lessons Learned from Implementing Agency-Led TechStat Reviews Across the Federal Government.

A Year in Review: Outcomes and Lessons Learned from Implementing Agency-Led TechStat Reviews Across the Federal Government. A Year in Review: Outcomes and Lessons Learned from Implementing Agency-Led TechStat Reviews Across the Federal Government CIO Council Management Best Practices Committee DECEMBER 8, 2011 Table of Contents

More information

U.S. Defense Priorities OSD PA&E

U.S. Defense Priorities OSD PA&E 1 U.S. Defense Priorities Deter potential adversaries and defend America and American interests Counter asymmetric threats including terrorism, cyber attacks and ballistic and cruise missiles Fight and

More information

Partnering with Small Business

Partnering with Small Business Partnering with Small Business Small Business Breakfast Ms. Essye Miller Director, Cyber Security, Army CIO/G-6 1 UNCLASSIFIED Army CIO/G-6 Organization CIO / G-6 Deputy, CIO / G-6 LTG Robert Ferrell Mr.

More information

Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10

Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10 EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 June 2, 2016 M-16-12 MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung United States Chief

More information

Profile. Business solutions with a difference

Profile. Business solutions with a difference Profile Business solutions with a difference Overview ITeM Group was founded in 1999 and has a successful history of delivering IT solutions in Australia, New Zealand, Indonesia, China and Canada. We specialise

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5144.02 November 21, 2014 DCMO SUBJECT: DoD Chief Information Officer (DoD CIO) References: See Enclosure 1. PURPOSE. Under the authority vested in the Secretary

More information

ENTERPRISE ARCHITECTURE AND IT PORTFOLIO MANAGEMENT FOR INTEGRATION

ENTERPRISE ARCHITECTURE AND IT PORTFOLIO MANAGEMENT FOR INTEGRATION ENTERPRISE ARCHITECTURE AND IT PORTFOLIO MANAGEMENT FOR INTEGRATION Christopher Steel Chief Solutions Architect Software AG Government Solutions 14 April 2016 2016 Software AG Government Solutions. All

More information

Cyber Security and Reliability in a Digital Cloud

Cyber Security and Reliability in a Digital Cloud JANUARY 2013 REPORT OF THE DEFENSE SCIENCE BOARD TASK FORCE ON Cyber Security and Reliability in a Digital Cloud JANUARY 2013 Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics

More information

Software Defined Hybrid IT. Execute your 2020 plan

Software Defined Hybrid IT. Execute your 2020 plan Software Defined Hybrid IT Execute your 2020 plan Disruptive Change Changing IT Service Delivery Cloud Computing Social Computing Big Data Mobility Cyber Security 2015 Unisys Corporation. All rights reserved.

More information

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas

More information

The CAG An Earthquake in Security Compliance and How Security Is Measured ALAN PALLER DIRECTOR OF RESEARCH SANS INSTITUTE APALLER@SANS.

The CAG An Earthquake in Security Compliance and How Security Is Measured ALAN PALLER DIRECTOR OF RESEARCH SANS INSTITUTE APALLER@SANS. The CAG An Earthquake in Security Compliance and How Security Is Measured ALAN PALLER DIRECTOR OF RESEARCH SANS INSTITUTE APALLER@SANS.ORG An Earthquake In Security Compliance The unpleasant wake up call

More information

Unified Capabilities (UC)

Unified Capabilities (UC) Unified Capabilities (UC) Andres J. Bryczek Unified Capabilities Development 6/11/2015 2:20 PM 18 Jun 2015 Unified Capabilities --What Do We Mean? Unified Capabilities Consolidate Phone Switches Streamline

More information

Helping the Military Integrate, Innovate and Secure Networks across the Enterprise

Helping the Military Integrate, Innovate and Secure Networks across the Enterprise JANUARY 2016 AGILE AND OPEN C4ISR SYSTEMS Helping the Military Integrate, Innovate and Secure Networks across the Enterprise The U.S. military is tasked with protecting our nation, putting the lives of

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

Fiscal Year (FY) 2016 Budget Estimates Defense Health Program Procurement Budget Item Justification

Fiscal Year (FY) 2016 Budget Estimates Defense Health Program Procurement Budget Item Justification APPROPRIATION / BUDGET ACTIVITY : P-1 ITEM NOMENCLATURE: Replacement/Modernization 97*0130 FY 2014 FY 2015 FY 2016 FY 2016 FY 2016 FY 2017 FY 2018 FY 2019 FY 2020 Cost ($ M) 641.577 283.030 330.504 0.000

More information

Statement of James Sheaffer, President North American Public Sector, CSC

Statement of James Sheaffer, President North American Public Sector, CSC Statement of James Sheaffer, President North American Public Sector, CSC United States House of Representatives Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection,

More information

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES. Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive

More information

DoD IT Service Management Initiatives Implications and Opportunities for Industry

DoD IT Service Management Initiatives Implications and Opportunities for Industry AFCEA JIE Mission Partner Symposium Success with JIE Industry Contracts in DoD DoD IT Service Management Initiatives Implications and Opportunities for Industry Bill Powell Cross Program ITSM and Governance

More information

Department of Homeland Security INFORMATION TECHNOLOGY STRATEGIC PLAN

Department of Homeland Security INFORMATION TECHNOLOGY STRATEGIC PLAN Department of Homeland Security INFORMATION TECHNOLOGY STRATEGIC PLAN FY 2015 2018 TABLE OF CONTENTS Message from DHS...04 Endorsements...05 Introduction...06 Mission, Vision, Principles...07 DHS IT Strategic

More information

Jun 2015 to Aug 2016. Computer Science/ Technology related. Information Systems

Jun 2015 to Aug 2016. Computer Science/ Technology related. Information Systems Outline IT_SAND_1 Jun 2015 to Aug 2016 Computer Science/ Technology related. Information Systems 4. Name: Cyber Security Threat Monitoring and Response 6. 7. To enhance and strengthen the ability for CLP

More information

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013 State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council

More information

Delta College Information Technology Strategic Plan. v

Delta College Information Technology Strategic Plan. v Delta College Information Technology Strategic Plan v.10.28.14 Table of Contents TECHNOLOGY STRATEGIC PLANNING ELEMENTS 3 MISSION 3 WE VALUE 3 VISION 3 STRATEGIC GOALS 4 TECHNOLOGY ROAD MAP 2013 / 2014

More information

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public. Federal CIO Council Information Security and Identity Management Committee (ISIMC) Guidelines for the Secure Use of Cloud Computing by Federal Departments and Agencies DRAFT V0.41 Earl Crane, CISSP, CISM

More information

Preventing and Defending Against Cyber Attacks October 2011

Preventing and Defending Against Cyber Attacks October 2011 Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their

More information

NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN

NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN 2013-2018 2 NAVAL SEA SYSTEMS COMMAND Foreword Everything the United States Navy brings to the fight, and ultimately does for the nation, is delivered

More information

Cybersecurity Framework: Current Status and Next Steps

Cybersecurity Framework: Current Status and Next Steps Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor Adam.Sedgewick@nist.gov National Institute of Standards

More information

Improving Cybersecurity and Resilience through Acquisition [DRAFT] IMPLEMENTATION PLAN

Improving Cybersecurity and Resilience through Acquisition [DRAFT] IMPLEMENTATION PLAN Improving Cybersecurity and Resilience through Acquisition [DRAFT] IMPLEMENTATION PLAN Version 1.0 February 2014 Page 1 of 7 Table of Contents Introduction... 3 Purpose... 3 Plan Development Process...

More information

STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO

STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO Introduction Since taking office in January 2015, Governor Larry Hogan has

More information

Accenture and Software as a Service: Moving to the Cloud to Accelerate Business Value for High Performance

Accenture and Software as a Service: Moving to the Cloud to Accelerate Business Value for High Performance Accenture and Software as a Service: Moving to the Cloud to Accelerate Business Value for High Performance Is Your Organization Facing Any of These Challenges? Cost pressures; need to do more with the

More information

Information Management & Technology (IM&T) Strategic Plan 2013-2016

Information Management & Technology (IM&T) Strategic Plan 2013-2016 Information Management & Technology (IM&T) Strategic Plan 2013-2016 DSTO: Science and Technology for Safeguarding Australia Introduction This document sets out a four-year strategy for information management

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8000.01 March 17, 2016 DoD CIO SUBJECT: Management of the Department of Defense Information Enterprise (DoD IE) References: See Enclosure 1 1. PURPOSE. This directive:

More information

Scott Renda Office of Management and Budget www.whitehouse.gov/omb/egov

Scott Renda Office of Management and Budget www.whitehouse.gov/omb/egov Cloud Computing Briefing Scott Renda Office of Management and Budget www.whitehouse.gov/omb/egov Cloud Computing Basics Style of computing Cloud Computing: What Does it Mean? Close public/private sector

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

Testimony of. Kevin Stine. Leader, Security Outreach and Integration Group. Computer Security Division. Information Technology Laboratory

Testimony of. Kevin Stine. Leader, Security Outreach and Integration Group. Computer Security Division. Information Technology Laboratory Testimony of Kevin Stine Leader, Security Outreach and Integration Group Computer Security Division Information Technology Laboratory National Institute of Standards and Technology United States Department

More information

Advanced Systems & Development

Advanced Systems & Development Advanced Systems & Development Transitioning to an Enterprise Ground System Lt Col Matt Kimsal SMC/ADY Envisioning and Shaping the Future of Space BLUF SMC/AD is generating a plan for the transformation

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

Cloud Computing and Enterprise Services

Cloud Computing and Enterprise Services Defense Information Systems Agency A Combat Support Agency Cloud Computing and Enterprise Services Alfred Rivera Technical Program Director 29 July 2010 Peak of Inflated Expectations You Are Here Plateau

More information

DISA and the Evolving DoD Enterprise

DISA and the Evolving DoD Enterprise 1 DISA and the Evolving DoD Enterprise 11 June 2014 Major General Alan R. Lynn Vice Director, Defense Information Systems Agency 20th Century Circuit & Dial tone Delivery UNCLASSIFIED DISA is Changing

More information

DEFENSE SECURITY SERVICE

DEFENSE SECURITY SERVICE DEFENSE SECURITY SERVICE DEFENSE SECURITY SERVICE U N I T E D S TAT E S O F A M E R I C A STRATEGIC PLAN 2012-2016 Partnership and Service for a Secure Future TABLE OF CONTENTS Who We Are Vision Values

More information

www.choice-solutions.com Storage Trends 2013-2014 Choice-Solutions Ltd.

www.choice-solutions.com Storage Trends 2013-2014 Choice-Solutions Ltd. Storage Trends 1 Top 4 Reasons for Storage Growth Data Explosion with Mobility, Social Media etc., Commoditization with Structured & Un-structured data Regulations & Compliance Low TCO Total Cost of Ownership

More information