Keynote Address. MilCIS Mohan Aiyaswami Chief Technology Officer
|
|
|
- Easter Curtis
- 9 years ago
- Views:
Transcription
1 Keynote Address MilCIS 2014 Mohan Aiyaswami Chief Technology Officer
2 Introduction A little bit about me Chief Technology Officer/Chief Information Security Officer Defence Responsible for: ICT Strategy, Technology Roadmaps and Architecture. Envisioning long term ICT Systems, Applications, Information Security and industry partnerships to be relevant to the future of Defence. Worked in a variety of roles in areas of technology, innovation, leadership, commercial and delivery across a large variety of businesses in Australia and around the world. Graduated from the University of Madras, with a Bachelor of Engineering.
3 Introduction Some of the highlights of my career The implementation of passenger reservation system for Indian Railways. Architect and Author of several products. Led the Enterprise Integration function for Coles Myer. Led the Enterprise Architecture Transition Program for Optus. CTO for manufacturing Vertical. IT strategy for Toll Group.
4 5 months in Some of our challenges The complexity of the Defence business and ICT landscape. The need for a holistic view of IT across Defence. Integrated ICT architecture that can address future needs of Defence. Information security that can address modern day cyber threats. Proliferation of data and information and the need to get relevant information from the data. Meaningful and clearly defined partnerships with Industry partners.
5 Operating Strategic The opportunities Shape the ICT Strategy and Governance for Defence (inline with the CIO s vision) A consolidated ICT strategy that is aligned to the Defence White Paper and can deliver the CIO s vision:. A single Defence ICT strategy and associated policies A strategy that is backed up a proper plan A plan that can be implemented; and A plan that can reflect the two speed ICT model. Shaping the project portfolio to reflect the strategic plan. A Governance structure that can ensure the success of the strategic plan.
6 Strategic Development a pragmatic and integrated architecture for Defence Make Enterprise Architecture a strategic asset for Defence. Ensuring a consistent framework and it s application is in place Understanding the deliverables of the current wave and plan for the next wave. Reviewing and revising Architecture Governance.. Developing the Integrated Defence Architecture that reflects the networked battle environment.
7 Operating Strategic Implement a comprehensive and contemporary Information & Security Strategy We have multiple stand alone networks. Information is distributed across all these networks. Modern day cyber threat can cause more harm than ever before. Securing the information as a holistic entity spread across all our networks is key.. Information security should detect and protect internal and external threats. We should be cognizant of ever evolving devices and infrastructure technologies.
8 Operating Strategic Shape two speed IT services Strategic plan that enables quick wins. Not compromising larger projects that need the time. Using CP and other flexible service delivery mechanisms. Enabling innovation as part of the strategic plan. Iterative prototyping where it is beneficial.. Business and Vendor engagement model to reflect the two speeds.
9 Operating Drive strategic engagement with Industry through a structured approach that supports innovation Share the strategy and vision with our strategic industry partners. Encourage them to come along with us in our journey. Provide clarity of engagement: Industry partners can be sure of opportunities; and Defence can be sure of Industry support.. Group Commercials branch has been established. Restructuring vendor governance. Establishing structured innovation with Industry.
10 Corporate and Enabling Services Strategic Core View: the Business Model Departmental Governance Advice to Government (Force Options) Whole of Government Services Advice to Government (Response Options) Strategy Development Capability Planning Raise, Train, Sustain Capability Development Preparedness (force-inbeing) Outcome 1 Conduct Operations Outcome 2 Outcome 1. Service Integration Financial Management People Management ICT Logistics Health Services Defence Support (Corporate Services) Legal Services Security Research & Development
11 Operating Security Strategic Business Architecture Aligning the various components and managing interdependencies is critical to the success of our business and military operations. Processes Services Information ICT Application Infrastructure
12 Strategic Sources of Innovation Innovation Model Internal R&D Entry Gate Review Gate Approval Gate Proof-of-concept / Prototype Go Gate Service Providers The Market Bench- Marking Innovation Proposition Criteria INNOVATION REGISTER Approval Gate Criteria Measure Operational. Unauthorised concepts
13 Working with Industry What role does Industry play? Industry is key to driving: Efficiencies and effectiveness Innovative ideas and solutions; and Developing current and future ICT Capability that support the business and military operations of Defence.
14 Questions?
Enterprise Architecture: A Governance Framework
Enterprise Architecture: A Governance Framework Part I: Embedding Architecture into the Organization Sohel Aziz, Thomas Obitz, Reva Modi and Santonu Sarkar The whitepapers arei related to two sessions
Information and Communication Technology
Position Description Position Title: Employment Type: Section: Division: Salary Band: Agreement: Reporting To: Enterprise Architect Full Time fixed term ICT Project Services Information and Communication
Cybersecurity..Is your PE Firm Ready? October 30, 2014
Cybersecurity..Is your PE Firm Ready? October 30, 2014 What you will learn. Understanding SEC s interest in cybersecurity Mitigating cyber risk at the PE firm and the portfolio companies Developing a plan
Contents. Evolving Trends in Core Banking Transformation (CBT) Challenges Faced in Core Banking Transformation (CBT)
Contents Preface From the Editor s Desk Evolving Trends in Core Banking Transformation (CBT) 01. Customer Expectations and Next Generation Banking 05 02. Survival Driving Core Banking Transformation (CBT)
How To Manage Risk On A Scada System
Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives (Revised March 2012) Disclaimer: To the extent permitted by law, this document
Defining a Governance Model for Portals
Defining a Governance Model for Portals Tushar Sachdev The need for governance While implementing portals, the focus is often only on technology. The implicit assumption being that the portal is yet another
Information Management & Technology (IM&T) Strategic Plan 2013-2016
Information Management & Technology (IM&T) Strategic Plan 2013-2016 DSTO: Science and Technology for Safeguarding Australia Introduction This document sets out a four-year strategy for information management
Office of the Chief Information Officer
Office of the Chief Information Officer Business Plan: 2012 2015 Department / Ministère: Executive Council Date: November 15, 2012 1 P a g e This Page Left Intentionally Blank 2 P a g e Contents The Business
Five Core Principles of Successful Business Architecture. STA Group, LLC Revised: May 2013
Five Core Principles of Successful Business Architecture STA Group, LLC Revised: May 2013 Executive Summary This whitepaper will provide readers with important principles and insights on business architecture
Job Description. Job Title Branch Business Group Reporting to Location. Purpose. Key Tasks
Job Description Job Title Branch Business Group Reporting to Location Enterprise Architect Knowledge, Information, Research and Technology Government Technology Services Chief Architect Wellington Salary
NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security
1 NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations Ian J West Chief, Cyber Security [email protected] 2 NATO UNCLASSIFIED Cyber Security Service Line Ian West
Defending against modern cyber threats
Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation
Agency for State Technology
Agency for State Technology 2015-2018 Statewide Information Technology Security Plan The Way Forward Rick Scott, Governor Jason M. Allison, State CIO Table of Contents From the Desk of the State Chief
2.0 ROLES AND RESPONSIBILITIES
2.0 ROLES AND RESPONSIBILITIES This handout describes applicable roles and responsibilities for the Capital Planning and Investment Process (CPIC) as presented in the NIST Integrating IT Security into
Setting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP
Setting up an Effective Enterprise Architecture capability Simon Townson Principal Enterprise Architect SAP Agenda Why? People and Organisation EA Framework Standards and Templates Tools Processes SAP
JOB PROFILE. For more detailed information about Internal Affairs, go to our website: www.dia.govt.nz.
JOB PROFILE Job Title: Enterprise Architect Business Unit: Chief Architect Business Group: Government Technology Services Branch: Reporting to: Chief Architect Location: Wellington Grade: 22 Date last
A HELPING HAND TO PROTECT YOUR REPUTATION
OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION
Information Technology Report MTA IT Department. MTA Finance Committee June 2015
Information Technology Report MTA IT Department MTA Finance Committee June 2015 Purpose/Overview This presentation has been prepared to update MTA Board members on major enterprise-wide technology strategies
Accountability Report. Department of Internal Services
Accountability Report 2014 2015 Department of Internal Services Table of Contents Accountability Statement... 3 Message from the Minister and Deputy Minister... 4 Financial Results... 5 Measuring Our Performance...
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service
According to NASSCOM-Frost & Sullivan's Study on 'Analytics' Product Excellence Matrix, the first in the seven-segment series
Analytics on a Transformation Path From a 'Good-to-Have' to a 'Must -Have Solution' According to NASSCOM-Frost & Sullivan's Study on 'Analytics' Product Excellence Matrix, the first in the seven-segment
(100% taught in English)
GRANDE ECOLE PROGRAM: NEW MAJOR AVAILABLE IN FALL 2014 Management of Digital Business and Information Technology (100% taught in English) 7 modules of 30 hours: 210 hours (contact hours) This course combines
Guidelines. for setting up. Dedicated Project Team. Page 1 of 14
Guidelines for setting up Dedicated Project Team Page 1 of 14 Foreword The National e-governance Plan of Indian Government seeks to lay the foundation and provide the impetus for long-term growth of e-governance
Business-Focused Objectives Key to a Winning MDM Implementation
Cognizant 20-20 Insights Business-Focused Objectives Key to a Winning MDM Implementation Successful MDM projects are defined by strong vision, structured business cases and a well-mapped ROI plan, all
POSITION SPECIFICATION ENTERPRISE ARCHITECT UK&I
POSITION SPECIFICATION ENTERPRISE ARCHITECT UK&I THE POSITION The Enterprise Architect will be supporting the Experian Consumer Services UK&I Architecture functions and processes. The Enterprise Architect
FAA Cloud Computing Strategy
FAA Cloud Computing Strategy Final - Version 1.0 May 2012 Federal Aviation Administration 800 Independence Avenue, SW Washington, D.C. 20591 SIGNATURE PAGE Table of Contents 1. Executive Summary... 1 2.
Accenture Technology Consulting. Clearing the Path for Business Growth
Accenture Technology Consulting Clearing the Path for Business Growth Mega technology waves are impacting and shaping organizations in a profound way When a company s executive management team considers
Information Communication Technology
Information Communication Technology Strategic Plan 2011 15 BTS11/00102 Commonwealth of Australia 2011 This work is copyright. You may download, display, print and reproduce this material in unaltered
Five Core Principles of Successful Business Architecture
Five Core Principles of Successful Business Architecture Authors: Greg Suddreth and Whynde Melaragno Strategic Technology Architects (STA Group, LLC) Sponsored by MEGA Presents a White Paper on: Five Core
CACI Cloud Consulting Services
Index 1. Summary... 3 2. Services provided... 3 2.1. Advisory... 3 2.2. Strategy and Architecture... 4 2.3. Cloud Application Development... 7 2.4. Cloud Service Management... 8 3. Pricing... 10 Page 2
Software Defined Hybrid IT. Execute your 2020 plan
Software Defined Hybrid IT Execute your 2020 plan Disruptive Change Changing IT Service Delivery Cloud Computing Social Computing Big Data Mobility Cyber Security 2015 Unisys Corporation. All rights reserved.
Cloud Computing Strategy. an addendum to the. Queensland Government. ICT Strategy 2013 17. Queensland Government
Department of Science, Information Technology, Innovation and the Arts Queensland Government Cloud Computing Strategy an addendum to the Queensland Government ICT Strategy 2013 17 Supporting Queensland
A. This Directive applies throughout DHS, unless exempted by statutory authority.
I. Purpose Department of Homeland Security DHS Directives System Directive Number: 103-02 Revision Number: 00 Issue Date: 6/19/2014 ENTERPRISE ARCHITECTURE MANAGEMENT This Directive establishes the Department
Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center
P a g e 1 Data Center is the Foundation of Carrier ICT Transformation As we transform into the digital economy, the role of the Data Center has evolved from just being a container holding its individual
Achieving High Performance with Cloud Computing in Uncertain Times Joseph Tobolski Director, Accenture Technology Labs
Achieving High Performance with Cloud Computing in Uncertain Times Joseph Tobolski Director, Accenture Technology Labs Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda
Bridging the IT Business Gap The Role of an Enterprise Architect
Whitepaper Bridging the IT Business Gap The Role of an Enterprise Architect Today s enterprises understand the value that Information Technology (IT) can bring to their business. IT supports day-to-day
Cyber Security: from threat to opportunity
IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known
Appendix A-2 Generic Job Titles for respective categories
Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide
Best Practices for Consolidation Projects
Best Practices for Consolidation Projects Lynne Glickman Solution Architect Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
Enabling Data Quality
Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &
Technology Strategy April 2014
Technology Strategy April 2014 Contents Overview 1 Our environment 1 Why change? 2 Our vision for technology what success looks like 3 Our approach 7 Transformation shifts how will we know we have been
IT-CNP, Inc. Capability Statement
Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government
Q3 IIBA Corporate Member Forum. Will start promptly on the hour
Q3 IIBA Corporate Member Forum Will start promptly on the hour AGENDA 7:00 Welcome and Introduction 7:05 The Business Analyst Guide to Business Architecture, Damian Wilson; Business Analysis Practice Leader,
Visual Enterprise Architecture
Business Process Management & Enterprise Architecture Services and Solutions October 2012 VEA: Click About to edit Us Master title style Global Presence Service and Solution Delivery in 22 Countries and
WITH BUSINESS STRATEGY
ALIGNING IT COST OPTIMIZATION WITH BUSINESS STRATEGY TABLE OF CONTENTS 2 The truth is in the data 4 A sustainable cost-optimization methodology 4 Context is king 5 Alfabet: Insight for IT financial management
Defence Information and Communications Technology Strategy 2009
Defence Information and Communications Technology Strategy 2009 Commonwealth of Australia 2009 This work is copyright. Apart from any use permitted under the Copyright Act 1968, no part may be reproduced
Unifying IT Vision Through Enterprise Architecture
Unifying IT Vision Through Enterprise Architecture A model for Strategic Alignment Northeast Ohio Information Technology & Enterprise Architects (NEO-ITEA) Presentation To: Integrate 2010: Uniting the
Simplify And Innovate The Way You Consume Cloud
A Forrester Consulting October 2014 Thought Leadership Paper Commissioned By Infosys Simplify And Innovate The Way You Consume Cloud Table Of Contents Executive Summary... 1 Cloud Adoption Is Gaining Maturity
WHY DO I NEED A PROGRAM MANAGEMENT OFFICE (AND HOW DO I GET ONE)?
WHY DO I NEED A PROGRAM MANAGEMENT OFFICE (AND HOW DO I GET ONE)? Due to the often complex and risky nature of projects, many organizations experience pressure for consistency in strategy, communication,
Steve Sims Business Intelligence Competency Centre
Steve Sims Business Intelligence Competency Centre October 2010 Establishing a BICC ABOUT STEVE SIMS Steve Sims has 16 years experience in business and information technology consulting, specialising in
DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO
DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes
Industrial Internet & Advanced Manufacturing
Industrial Internet & Advanced Manufacturing Marco Annunziata, Chief Economist April 08, 2014 Imagination at work. The Future of Work Advanced Manufacturing + The Industrial Internet + The Global Brain
Full year results. Corero Network Security plc, the AIM network security company, announces its audited results for the year ended 31 December 2014.
26 March 2015 Corero Network Security plc (AIM: CNS) ( Corero or the Company ) Full year results Corero Network Security plc, the AIM network security company, announces its audited results for the year
Blue Fire Thames Court 1 Victoria Street Windsor SL4 1YB [email protected] www.bluefire-uk.com
Blue Fire Thames Court 1 Victoria Street Windsor SL4 1YB [email protected] www.bluefire-uk.com 1 1. Service Description Blue Fire is a Digital and IT Practice focused on supplying individuals and
How to Safely Migrate your ERP to the Cloud in Three Steps
How to Safely Migrate your ERP to the Cloud in Three Steps Introduction Enterprise Resource Planning (ERP) has served as the central nervous system of large organisations for the past two decades. The
CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management
CYBERBOK Security Essential Body of Knowledge: A Competency and Functional Framework for Security Workforce Development aligned with ISO 31000* risk management principles and guidelines. *Note : ISO 31000
Planning for a Successful Information Governance Program. Kathy Downing, MA, RHIA CHPS,PMP AHIMA Senior Director IG
Planning for a Successful Information Governance Program Kathy Downing, MA, RHIA CHPS,PMP AHIMA Senior Director IG Objectives Overview of Project Management Applying Project Management techniques to Information
HR Service Delivery: Campus Initiatives
HR Service Delivery: Campus Initiatives David Odato, UCSF Jeannine Raymond, UCB Ramona Agrela, UCI Karen Hull, UCD Facilitated by: Scott Bolman, Mercer University of California Human Resources December
BI STRATEGY FRAMEWORK
BI STRATEGY FRAMEWORK Overview Organizations have been investing and building their information infrastructure and thereby accounting to massive amount of data. Now with the advent of Smart Phones, Social
WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101
WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101 Prepared by: Phillip Bailey, Service Management Consultant Steve Ingall, Head of Service Management Consultancy 60 Lombard Street London EC3V 9EA
OCIO Strategy 2014. Page 1 CTZ-2014-00129
OCIO Strategy 2014 Page 1 Table of contents 03 Message from the GCIO & Strategy Steering Committee 05 Introduction and context 07 Our Vision and Mission 08 Our stakeholders 09 Our Roles 11 Our Values 12
By Peter Merholz, http://peterme.com. If you use it, please attribute it. Thanks.
Ideation/Generation Definition / Requirements Iterative design Implementation Ideation/Generation Definition / Requirements Iterative design Implementation Understand the market Customer empathy Ideation/Generation
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
State of Michigan Department of Technology, Management & Budget
State of Michigan Department of Technology, Management & Budget Information, Communications and Technology (ICT) Strategy Technical Advisory Services Prepared for: Deliverable F Road Map 24 February 2012
Main Themes. Speakers Include: include. Event Agenda - Day One
Norton Park, Winchester 1st & 2nd December 2015 Speakers Include: include Simon Clements Director, Digital Business Programme Crown Prosecution Service John Holland Head of Data and Analytics Architecture-
Office of the Auditor General AUDIT OF IT GOVERNANCE. Tabled at Audit Committee March 12, 2015
Office of the Auditor General AUDIT OF IT GOVERNANCE Tabled at Audit Committee March 12, 2015 This page has intentionally been left blank Table of Contents Executive Summary... 1 Introduction... 1 Background...
DOD Medical Device Cybersecurity Considerations
Enedina Guerrero, Acting Chief, Incident Mgmt. Section, Cyber Security Ops Branch 2015 Defense Health Information Technology Symposium DOD Medical Device Cybersecurity Considerations 1 DHA Vision A joint,
Knowledge Driven Service Innovation and Management:
Knowledge Driven Service Innovation and Management: IT Strategies for Business Alignment and Value Creation Eng K. Chew University of Technology Sydney, Australia Petter Gottschalk Bl Norwegian School
Data centre strategies for business growth in a hybrid cloud world
Data centre strategies for business growth in a hybrid cloud world A joint report from Pacnet and CIO Custom Solutions Group October 2014 Introduction The data centre has become an integral part of the
Division of Information Technology. Strategic Plan 2012 THE GEORGE WASHINGTON UNIVERSITY
Division of Information Technology Strategic Plan 2012 THE GEORGE WASHINGTON UNIVERSITY 1 FROM THE CHIEF INFORMATION OFFICER FROM THE CHIEF INFORMATION OFFICER Dear Colleagues, The George Washington University
Cyber Security VTT and the Finnish Approach
Cyber Security VTT and the Finnish Approach September 22, 2015 Reijo Savola, Principal Scientist CHALLENGES Explosive increase in number and impact of cyber security attacks Use of Internet technologies
ITIL. Lifecycle. www.alctraining.com.my. ITIL Intermediate: Continual Service Improvement. Service Strategy. Service Design. Service Transition
Take your ITIL skills to the next level ITIL Lifecycle ITIL Intermediate: Part of the complete ITIL Education Program Advance your career Add value to your organisation Gain credits towards ITIL Expert
Three Strategies for Implementing HR in the Cloud
Three Strategies for Implementing HR in the Cloud Adoption of cloud-based, software-as-a-service (SaaS) human resource management systems (HRMS) has become one of the hottest trends in HR. According to
Data Governance from the ground up! A data architect s approach to data governance
Data Governance from the ground up! A data architect s approach to data governance Steven Tuften DAMA Chapter, Sydney 21 Feb 2012 Allianz Australia General Insurance Company of the Year 2011* Best General
Value to the Mission. FEA Practice Guidance. Federal Enterprise Architecture Program Management Office, OMB
Value to the Mission FEA Practice Guidance Federal Enterprise Program Management Office, OMB November 2007 FEA Practice Guidance Table of Contents Section 1: Overview...1-1 About the FEA Practice Guidance...
