DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
|
|
|
- Sherilyn Moore
- 10 years ago
- Views:
Transcription
1 DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
2
3 DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace, where the barrier to entry is low and oftentimes unchallenged. We must recognize that mission success is defined by our ability to pre-emptively disrupt, degrade, or deny our adversaries, both internal and external, unimpeded access to the information and capabilities of the Department of Defense Information Network (DODIN). We must sustain our operations and defenses before, during, and after an attack by reducing the attack surface, continually improving defensive cyberspace operations, and effectively commanding and controlling the DODIN. We are the premier Information Technology Combat Support Agency that provides and assures command, control, communications, computing, intelligence, surveillance, and reconnaissance (C4ISR) to the warfighter. We deliver enterprise services and data at the user point of need. We now serve as the joint operational arm of defensive cyberspace operations, for the Department of Defense.
4 DEFENSE INFORMATION SYSTEMS AGENCY Our Mission requires that we remain purposeful in planning, acquisition, operations, and execution. As the provider for defensive cyberspace and IT combat support for the DoD we will: Focus on our global infrastructure of telecommunications and services delivery comprised of a hybrid cyberspace ecosystem of mobile, collaboration, internal clouds, and commercial clouds. Synchronize command and control (C2) and senior leadership support to effectively streamline decision making within all echelons of National and DoD leadership. Enable warfighter capabilities from a sovereign cyberspace domain, focused on speed, agility, and access. Reduce costs by eliminating duplication in production and operations. We will be aggressive in our pursuit of efficiency and effectiveness, and no longer support the operations of legacy and costly applications without senior leadership s approval and direction. We recognize our value added within this mission space and will continually fine tune our efforts. This Agency will remain in step with, or ahead of, our mission partners and proactively evolve capability requirements to meet operational needs. We will bring the business of defensive cyberspace operations support for the DoD under one roof Our Roof. The Joint Information Environment (JIE) remains the cornerstone of the Department s future providing a secure information framework from which our national senior leaders and joint force commanders, command and control forces that deliver responsive, decisive actions from any device; anytime anywhere. We will continue to lead the DoD cyberspace and information technology optimization efforts. This includes eliminating Department duplication of effort, capitalizing on the range of commercial cloud solutions, and maintaining the operational cyberspace integrity of the DODIN services we defend, operate, and assure. Our agile enterprise will emphasize on-demand, real-time, 24x7, secure access and availability.
5 STRATEGIC PLAN Over the next several months, DISA will: Evolve the Joint Force Headquarters DODIN (JFHQ-DODIN) Deploy and operationalize the Joint Regional Security Stacks (JRSS) platform Continue to implement our reorganization Maintain our superior delivery of capability to our mission partners Enhance mobility and collaboration capabilities This message sets out an action-based plan for the future. Our future state will include common enterprise services and single-user interfaces with multi-level security and normalized data. Cyberspace workforce development will continue to evolve through cooperative efforts with our Intelligence Community (IC) and industry partners to enable a multi-faceted, highly skilled countermeasure to nation states, rogue entities, insider threats, and malicious attacks by hacktivists. We will manage risk within the execution of our cybersecurity mission through standardization, reciprocity, and continuous monitoring to achieve information dominance. We are a professional and innovative civilian and military team. Along with our mission and industry partners, we will continue to produce valued results. DISA is adapting to the changing cyberspace, technological, and fiscal environments. We will ensure that we monitor our progress through meaningful and measurable metrics and analytics that will be exposed for internal consumption by the workforce. We are first and foremost The Department of Defense s Defensive Cyberspace IT Combat Support Agency. We cannot allow ourselves to be held to an era or standards that point to the past and the way things used to be. We must always look toward the horizon, the next conflict, the next opportunity to answer the call and assist in Defending the Nation and her sovereign interests. We are DISA United in Service to Our Nation! Ronnie D. Hawkins, Jr. RONNIE D. HAWKINS, JR. Lieutenant General, USAF Director
6 DEFENSE INFORMATION SYSTEMS AGENCY THE DISA VISION Information superiority in defense of our Nation. THE DISA MISSION THE OBJECTIVE STATE DISA, a Combat Support Agency, provides, operates, and assures command and control, information-sharing capabilities, and a globally accessible enterprise information infrastructure in direct support to joint warfighters, national-level leaders, and other mission and coalition partners across the full spectrum of operations. Assured, scalable, managed access to services and data In all environments At the point of need Provided from cost-effective infrastructure and computing. We are increasing our investments in cyber, in recognition of the growing threat that cyber poses to our national security and critical infrastructure. Ashton B. Carter, Secretary of Defense
7 STRATEGIC PLAN OUR PLANNING METHODOLGY DISA s planning methodology consists of the development of two plans: the Strategic Plan and the Strategic Roadmap. The DISA Strategic Plan is influenced by overarching Department-level guidance and provides a common understanding of our Agency mission and vision, and further identifies the strategic goals and objective state that prioritize our efforts and postures the Agency for the future. Included in the plan is a technology outlook that drives technology investments for the Agency. The Strategic Plan guides the development of a Strategic Roadmap which identifies objectives, major actions and tasks, and resource alignment to meet our goals. These plans form our framework that supports the Department s vision to achieve a more effective, secure, and efficient enterprise for the DoD and the Nation. The target delivery of the Strategic Roadmap is October DEPARTMENT-LEVEL GUIDANCE PERFORMANCE METRICS & REPORTING STRATEGIC PLAN STRATEGIC ROADMAP The military that maintains the most agile and resilient networks will be the most effective in future war. This is the kind of force we are building for the future. General Martin E. Dempsey, Chairman, Joint Chiefs of Staff
8 DEFENSE INFORMATION SYSTEMS AGENCY OPERATING PRINCIPLES DISA s operating principles provide the tenets by which the Agency makes key strategic decisions. These principles guide our actions. Single Point of Entry The need for one entry point to access DISA information and services to: Enhance Customer Relationship Management (CRM) processes focused on automating, to the maximum extent possible, the requirements management and fulfillment components of our services Enhance DISA s outreach efforts enabling DISA personnel to accurately and concisely promote current and planned DISA services, and improve responsiveness to mission partners emerging requirements (e.g. Integrated Priority Lists (IPLs), COCOM Campaign Plans) Optimize Department Investment Enable the Department to maximize use of its resources by providing cost-efficient capabilities; an effective and defensible infrastructure; and standardized support services, business processes, and policies that enable the rapid infusion of technology into the enterprise Streamline Agency acquisition and contracting processes to support the enterprise Manage mission partner requirements to achieve strategic sourcing cost and performance efficiencies, eliminate duplication and maximize Enterprise License Agreements (ELAs) Agility & Speed to Market Implementation of acquisition and procurement best practices that allow for agility in development, and rapid deployment of capabilities to the warfighter Continue the DISA-first fielding and test methodology Enable our mission partners to rapidly innovate independent of DISA by leveraging DISA and commercial services CYBER Authorized, authenticated user access and freedom of maneuver to cloud, collaboration, and command and control capabilities; without impact from rogue entities, hacktivists, nation states, or insider threats.
9 STRATEGIC PLAN THE DISA STRATEGIC GOALS Provide Global Infrastructure We will develop, test, deploy, sustain, and maintain a global elastic infrastructure, spectrum, computing, and storage capabilities that will support full spectrum collaboration. The foundational elements of those services will be comprised of reusable components. All elements will be normalized, converged, and available at reduced cost, increased usability, and maximum portability to mobile platforms. We will expand our delivery of enterprise services to the Services, agencies, and DoD and national-level leadership. Provide Mission Partner and Leadership Support We will design, develop, implement, and maintain optimized, cost-efficient, interoperable decision support systems to be used by mission partners at all levels of senior leadership. We will ensure senior leadership has a modernized, reliable suite of services and capabilities that enhance the execution of crisis management, coalition, and deliberate planning activities. Provide Command and Control (C2) and Enable Cyberspace Sovereignty We will execute synchronized DODIN command, operations, and cyber defense missions to ensure freedom of maneuver for the warfighter and mission partners. We will establish, train, and implement cyber workforce elements; shape readiness through continuity programs; and execute synchronized operations that will offer us more visibility and response to cyber threats. As the DoD CIO, I have ONE IMPERATIVE to ensure that warfighters have the right IT/cyber, secure communications equipment and capabilities they need to execute the missions given to the greatest fighting force in the world. Terry Halvorsen, DoD CIO CLOUD Scalable user access at the point of need for software, processing, and infrastructure and storage services.
10 DEFENSE INFORMATION SYSTEMS AGENCY CHIEF TECHNOLOGY OFFICER S TECHNOLOGY OUTLOOK The need for information superiority has never been greater across the spectrum of military operations and within a contested battlespace which includes the cyber domain.
11 STRATEGIC PLAN Mobile devices and applications, as well as cloud computing services continue to transform our operational landscape and enable greater mission effectiveness through improved communication, access, information sharing, data analytics resulting in more rapid operational response times. Research in the areas of communications, networking, cybersecurity, and enterprise services continue to produce capabilities that significantly enhance our warfighting and business systems and services. Ensuring the viability of technological solutions that meet current and future requirements of the Department s information environment requires that we efficiently integrate mature solutions, and at the same time influence research and technology initiatives that address our most critical gaps and capability shortfalls. DISA s technical strategies ensure these emerging capabilities are well-engineered and provide technically sound solutions. These strategies are the basis for the development, integration, and operations of the Agency s critical cyber-based capabilities and services. TOMORROW AND BEYOND The growing information demands of our users necessitate that DISA excel in the identification and characterization of technological advancements that hold future relevance and benefit to the Department. DISA will continue to maintain the DISA Technology Watchlist a set of key technology areas that are the most critical for DISA to understand, acquire, and evolve over the next 5 years. DISA will effectively manage the identification, acquisition, adoption, insertion, and integration of advanced technology into DISA systems and operations. DISA will also employ robust techniques of technology assessment and characterization, experimentation, and piloting. The ability to conduct quantitative and qualitative technology evaluations, experiments, proof of concepts, and piloting activities is critical to the successful integration of these technologies and capabilities. The DISA Technology Watchlist identifies specific technology areas that contribute to the future of the following capabilities:
12 DEFENSE INFORMATION SYSTEMS AGENCY Networking technologies that will improve the performance, reliability, adaptability, and security of DoD networks and collapse today s multiple encrypted network enclaves (NIPRNET, SIPRNET, Coalition, etc.) into a single, integrated transport network. Computing and storage technologies that will transform today s fixed, redundant computing and storage solutions to an elastic data environment where compute and storage capacity is flexible, interoperable, and transient. Unified Capability technologies that will improve productivity, strengthen information sharing, and enhance the teamwork of DoD warfighters and civilian personnel. Mobility Device and Application technologies that will evolve the DoD enterprise to where all personnel have the freedom of action to securely work in any location, over any device, across any network. Cybersecurity technologies that will strengthen the resiliency of defense-indepth cybersecurity posture to absorb major attacks without any significant CYBERSPACE supports operations extensively in all of my mission areas and has become a critical facet of national power. We must continue to develop a robust cyber mission force with the authorities, skills, and resources to protect against a maturing set of cyber threats. Admiral Cecil D. Haney Commander USSTRATCOM disruption to DoD operations. Network Operations technologies that will ensure the continuity of cyber domain operations in the face of disruption and attack, adversary activity is known, and cyber threats are mitigated. COLLABORATIONWarfighters, coalition, intergovernmental organizations and industry with access to mission partner and enterprise-wide capabilities.
13 STRATEGIC PLAN COMMAND & CONTROL OF THE DODIN Cyber workforce and mission assurance professionals executing operational control of the DODIN infrastructure and computing resources. OF The current CYBER THREAT environment is uncertain and ever changing. What is certain, however, is the pervasive nature of those cyber threats and the increasing sophistication of adversaries. THE DODIN The DISA Chief Technology Officer (CTO) is responsible for the development of the overall technical strategies, technical review, and technical oversight of the Agency s products and services. The CTO s objective is to assist in making relevant and wellinformed technology investment decisions for DISA. We achieve these outcomes by Admiral Michael S. Rogers Commander USCYBERCOM conducting technical reconnaissance, assessing critical and promising technology solutions, and developing technology forecasts and innovation roadmaps for existing and future DISA programs. DISA continues to expand technology outreach activities by establishing relationships with key stakeholders in DoD, Government, industry, and academia. The partnerships are critical to forecasting and focusing promising technologies for innovative enterprise solutions and an enhanced information environment.
14 DEFENSE INFORMATION SYSTEMS AGENCY CONCLUSION As the IT Combat Support Agency for the Department of Defense, we are committed to our mission partners. We commit to: Acquiring, integrating, delivering, operating, and sustaining the best services and capabilities in cyber, cloud, collaboration, and command and control Providing a robust, synchronized, normalized, and mobile accessible infrastructure and computing environment Enabling the seamless immediate connection, sharing, and assured access to the full suite of information capabilities and enterprise services This plan describes DISA s fundamental goals that form the core of our commitment our high-level strategy to deliver global infrastructure, mission partner and senior leader support, and enable cyberspace sovereignty for the warfighter. Our people are our strength. That ethos, coupled with our leadership s desire to meet the Department s fiscally challenged and resource-constrained operational environment head-on, will drive us to identify efficiencies, eliminate duplication, and channel our resources into the highest priorities. We will balance our execution constraints and the growing need to adopt technologies that enable the freedom of maneuver in the cyber domain. We will continue to align resources and shape our workforce to meet the needs of the Department and our mission partners. Rest assured, we don t take the commitment to our mission partners lightly. We are a key enabler for their success and we are in this together. WE ARE DISA.
15 STRATEGIC PLAN
16 DEFENSE INFORMATION SYSTEMS AGENCY We are global professionals vital to the defense of our Nation We respond to mission priorities with speed and urgency We embrace the values and potential of our people We engage through a collaborative environment We know diversity leads to innovation We believe individual growth, learning, and proficiency are critical to our future We value perseverance and recognize failure as a growth opportunity We build trust through transparency We hold ourselves accountable We are United in Service WE ARE DISA DEDICATION INTEGRITY SERVICE ALWAYS DISA STRATEGIC PLAN
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE
ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
How To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2014 2019 VERSION 2
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2014 2019 VERSION 2 A COMBAT SUPPORT AGENCY D E F E N S E I N F O R M A T I O N S Y S T E M S A G E N C Y Director s Intent Two years ago, I stated in
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO
DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes
Agency for State Technology
Agency for State Technology 2015-2018 Statewide Information Technology Security Plan The Way Forward Rick Scott, Governor Jason M. Allison, State CIO Table of Contents From the Desk of the State Chief
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
Table of Contents CYBER SECURITY STRATEGIC PLAN VERSION 1.0
U.S DEPARTMENT OF ENERGY CYBER SECURITY PROGRAM CYBER SECURITY STRATEGIC PLAN FEBRUARY 12, 2007 Table of Contents INTRODUCTION... 4 CYBER SECURITY STRATEGY OVERVIEW... 5 CYBER SECURITY VISION AND MISSION...
Cyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
FROM THE DOD CIO. Teresa M. Takai, DoD CIO
FROM THE DOD CIO The challenge of managing information technology (IT) within the Department of Defense has never been greater. The Department s mission continues to expand to encompass military, peacekeeper,
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN 2013-2018 2 NAVAL SEA SYSTEMS COMMAND Foreword Everything the United States Navy brings to the fight, and ultimately does for the nation, is delivered
UNITED STATES AIR FORCE. Air Force Product Support Enterprise Vision
UNITED STATES AIR FORCE Air Force Product Support Enterprise Vision July 2013 Foreword Product Support is a set of functions and products that enables operational capability and readiness of systems, subsystems,
Department of Homeland Security INFORMATION TECHNOLOGY STRATEGIC PLAN
Department of Homeland Security INFORMATION TECHNOLOGY STRATEGIC PLAN FY 2015 2018 TABLE OF CONTENTS Message from DHS...04 Endorsements...05 Introduction...06 Mission, Vision, Principles...07 DHS IT Strategic
DEFENSE SECURITY SERVICE
DEFENSE SECURITY SERVICE DEFENSE SECURITY SERVICE U N I T E D S TAT E S O F A M E R I C A STRATEGIC PLAN 2012-2016 Partnership and Service for a Secure Future TABLE OF CONTENTS Who We Are Vision Values
Navy Information Dominance Industry Day
Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic
Marine Corps. Commercial Mobile Device Strategy
Marine Corps Commercial Mobile Device Strategy April 2013 THIS PAGE INTENTIONALLY LEFT BLANK FOREWORD The currently constrained budget environment requires us to balance fiscal responsibility and mission
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012
(U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)
Information Technology Strategic Plan 2014-2017
Information Technology Strategic Plan 2014-2017 Leveraging information technology to create a competitive advantage for UW-Green Bay Approved December 2013 (Effective January 2014 December 2017) Contents
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0
Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0 Volume I Management Overview of the DoD IEA July 2012 Prepared by: Department of Defense Office of the Chief Information
IRM FY2014 2018. Information Resources Management Strategic Plan
IRM FY2014 2018 Information Resources Management Strategic Plan DOE IRM Mission Advance the Department s mission through policy, standards, and services, which meet mission requirements, balance risk and
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
Cybersecurity Delivering Confidence in the Cyber Domain
Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
To the Men and Women of the Coast Guard:
United States Coast Guard Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance & Information Technology (C4ISR&IT) Strategic Plan Fiscal Years 2015-2019 To the Men and
Accenture Technology Consulting. Clearing the Path for Business Growth
Accenture Technology Consulting Clearing the Path for Business Growth Mega technology waves are impacting and shaping organizations in a profound way When a company s executive management team considers
The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap
The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap AAMVA Region I Conference E-ID, DLDV, and Privacy Conducting Business Securely
Cloud Computing Strategy
Department of Defense Chief Information Officer Cloud Computing Strategy July 2012 This page intentionally left blank EXECUTIVE SUMMARY In the current political, economic, and technological landscape,
DISA and the Evolving DoD Enterprise
1 DISA and the Evolving DoD Enterprise 11 June 2014 Major General Alan R. Lynn Vice Director, Defense Information Systems Agency 20th Century Circuit & Dial tone Delivery UNCLASSIFIED DISA is Changing
University of Hawaii Information Technology Services Strategic Plan May 22, 2015. Looking Forward to 2020 and Beyond [V15-1]
University of Hawaii Information Technology Services Strategic Plan May 22, 2015 [V15-1] I. Introduction This Information Technology Services (ITS) Strategic Plan, Looking Forward to 2020 and Beyond, updates
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 7045.14 January 25, 2013 USD(C) SUBJECT: The Planning, Programming, Budgeting, and Execution (PPBE) Process References: See Enclosure 1 1. PURPOSE. This Directive:
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Statement. Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation. Before
Statement of Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation Before THE UNITED STATES SENATE ARMED SERVICES COMMITTEE (SUBCOMMITTEE ON READINESS AND MANAGEMENT SUPPORT)
Unified Capabilities (UC)
Unified Capabilities (UC) Andres J. Bryczek Unified Capabilities Development 6/11/2015 2:20 PM 18 Jun 2015 Unified Capabilities --What Do We Mean? Unified Capabilities Consolidate Phone Switches Streamline
Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise
Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:
Defining a Secure Mobile Framework Architecture at DHA
Ms. Janine Oakley, Transition Manager Innovation and Advanced Technology Development Division 2015 Defense Health Information Technology Symposium Defining a Secure Mobile Framework Architecture at DHA
Cyber Workforce Training
Cyber Workforce Training Mr Steve Jurinko DISA/PEO-MA 13 May 2014 1 DISA Cybersecurity Workforce Initiatives Cyber Workforce Coding DOD CIO initiative To identify the Cyber Workforce (CWF) across DISA
DoD IT Enterprise Strategy and Roadmap Department of Defense (DoD) Information Technology (IT) Enterprise Strategy and Roadmap
Department of Defense (DoD) Information Technology (IT) Enterprise Strategy and Roadmap Version 1.0 6 SEP 11 September 2011 iii Foreword The number of networks the Department of Defense (DoD) uses to execute
Forecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
Cloud Computing Strategy
Department of Defense Chief Information Officer Cloud Computing Strategy July 2012 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is
Army Cloud Computing Strategy
Army Cloud Computing Strategy MARCH 2015 Enterprise Architecture Division Army Architecture Integration Center HQDA CIO/G-6 Version 1.0 This page intentionally left blank. TABLE OF CONTENTS FOREWORD...
United States Department of Defense
Defense.gov News Release: DOD Releases Cloud Computing Str... http://www.defense.gov/releases/release.aspx?releaseid=15435 1 of 3 7/11/2012 3:57 PM United States Department of Defense TOP LINKS Subscribe
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:
Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy
Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee
The Department of Defense Strategy for Implementing the Joint Information Environment
The Department of Defense Strategy for Implementing the Joint Information Environment September 18, 2013 The estimated cost of report or study for the Department of Defense is approximately $27,000 for
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 7045.20 September 25, 2008 USD(P) SUBJECT: Capability Portfolio Management References: See Enclosure 1 1. PURPOSE. This Directive: a. Establishes policy and assigns
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
Technology Services Strategic Plan
Technology Services Strategic Plan 2014 Table of Contents A Changing Landscape... 3 Values... 4 Technology Services Goals... 5 Employee Engagement... 6 Operational Efficiency... 7 Agency Satisfaction...
How To Build A More Agile Total Naval Force
DEPARTMENT of the NAVY HUMAN BUILDING AND MANAGING CAPITAL THE TOTAL NAVAL FORCE STRATEGY 2 0 0 7 Moving forward to execute a comprehensive strategy to enhance combat effectiveness in the 21st Century,
Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP
Why Cybersecurity Matters in Government Contracting Robert Nichols, Covington & Burling LLP Cybersecurity is the No. 1 Concern of General Counsel and Directors 2 Cybersecurity Concerns in the Government
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
IT Governance Overview
IT Governance Overview Contents Executive Summary... 3 What is IT Governance?... 4 Strategic Vision and IT Guiding Principles... 4 Campus-Wide IT Strategic Vision... 4 IT Guiding Principles... 4 The Scope
DISA Testing Services for the Enterprise. Luanne Overstreet
DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5144.02 November 21, 2014 DCMO SUBJECT: DoD Chief Information Officer (DoD CIO) References: See Enclosure 1. PURPOSE. Under the authority vested in the Secretary
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications
Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee
DoD Joint Information Enterprise
DoD CIO DoD Joint Information Enterprise Mr. David DeVries DoD Deputy Chief Information Officer For Information Enterprise (IE) May 21, 2013 DoD s Cyber Footprint How Big? DoD IT User Base ~1.4 million
Cybersecurity Converged Resilience :
Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the
The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
January 2010. Navy s Total Force Vision for the 21st Century
January 2010 Navy s Total Force Vision for the 21st Century I am comm mmitted to ensur urin g th at we, as a Navy, ar e goin g to be one of the bes t places for a young person to sta tart their career.
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5000.01 May 12, 2003 Certified Current as of November 20, 2007 SUBJECT: The Defense Acquisition System USD(AT&L) References: (a) DoD Directive 5000.1, The Defense
DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process
Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY
Some Thoughts on the Future of Cyber-security
Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions
INDUSTRY PERSPECTIVE
INDUSTRY PERSPECTIVE 1 A Brief Introduction As IT administrators and chief information officers, you face a particular challenge: facilitate the ability for your agency to work remotely, while reducing
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
DEFENSE TRAVEL MANAGEMENT OFFICE. Defense Travel Management Office FY 2012 FY 2016 Strategic Plan
DEFENSE TRAVEL MANAGEMENT OFFICE Defense Travel Management Office FY 2012 FY 2016 Strategic Plan December 2011 Table of Contents 1. Introduction... 1 2. DTMO Overview... 1 3. DTMO Strategy... 6 4. Measuring
Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel
Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel May 5th, 2015 10:00-11:30 a.m. Hyatt Regency, Indian Wells, CA Thank you all for welcoming me. It
Space Ground Services in the Joint Information Environment (JIE)
Space Ground Services in the Joint Information Environment (JIE) Scott Niebuhr, Jeremy Burton, Judy Kerner, Sky Troyer The Aerospace Corporation 2015 The Aerospace Corporation Space Ground Services in
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Marine Corps Private Cloud Computing Environment Strategy
Marine Corps Private Cloud Computing Environment Strategy 15 May 2012 THIS PAGE INTENTIONALLY LEFT BLANK Foreword The United States Marine Corps (USMC) Cloud Strategy supports the Commandant of the Marine
DOCUMENT CHANGE RECORD
DOCUMENT CHANGE RECORD Version Number Date Description V 0.1 April 19, 2010 Pre-Decisional Draft Release V 0.2 July 23, 2010 Pre-Decisional Draft Release V 0.3 September 15, 2010 Pre-Decisional Draft Release
Network Management and Defense Telos offers a full range of managed services for:
Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:
