Cryptologic Systems Group Securing the Global Information Grid (GIG)
|
|
|
- Melissa Carr
- 9 years ago
- Views:
Transcription
1 Cryptologic Systems Group Securing the Global Information Grid (GIG) Air Force Cryptographic Modernization Third Annual Layered Assurance Workshop 4-5 August 2009 Mrs. Mary Anne Smith Director, AF Crypto Mod Program Office CPSG/ZX, Lackland AFB, TX DISTRIBUTION A: Approved for public release; distribution unlimited. (Approval given by Public Affairs Office)
2 Purpose Present an overview of Cryptologic Systems Group (CPSG) & Air Force Cryptographic Modernization Program Office (CMPO) to attendees at the Third Annual Layered Assurance Workshop Securing the Global Information Grid (GIG) Slide #2
3 Outline AF challenges AF Cryptologic Systems Group (CPSG) AF Cryptographic Modernization Program Office (CMPO) AF CM acquisition & modernization approach Programs & interest areas CM challenges - technical, budget & programmatic Securing the Global Information Grid (GIG) Slide #3
4 Air Force Challenges Securing Today s Cyber Battlefield More Complex Battlefield Sophisticated Global Enemy Dynamic & Evolving Environment Securing the Global Information Grid (GIG) Slide #4
5 Cryptologic Systems Group Mission: Assured Information Dominance Vision: Securing the Global Information Grid Securing the Global Information Grid (GIG) Slide #5
6 CPSG Organization ESC/CC Lt Gen Bowlds FYDP $3B in Cyber Acquisition Public Key Infrastructure (PKI) 653rd ELSW/CL Mr. Mason Key Management Infrastructure (KMI) Crypto Mod - 9 ACAT III programs CPSG/CC Col Collamore Information Assurance NI Mr. Collazo Special Projects ZJ Mr. Friesenhahn Crypto Modernization ZX Ms. Smith COMSEC Products ZC Ms. Moncus Intel & Force Protect ZI Mr. Aguirre PKI AF EKMS KMI GIG-IA (III) KG-327, TT&C AVE (III) KS-252, TT&C GOE (III) Space Mission Data (III) Space COMSEC Crypto Modernization KS-60 ICU (III) KG-3X (III) ROME Crypto Transformation IFF Mode 5 CM (III) RRK (III) CKG (III) VACM (III) Air / Ground COMSEC ITAC Consolidated SIGINT Support Activity Technical Applications Tactical Intel Force Protection Contracting PK Ms. Hair Financial Mgmt FM Mr. Kane Mission Support OM Mr. Dietert Engineering EN Ms. Moncus (A) Maintenance MA Mr. Parmigiani Logistics LG Mr. Jandt Securing the Global Information Grid (GIG) Slide #6
7 Current Cryptographic Inventory Security & component technologies are aged/aging Typically point-to-point with little to no net-centric/ Internet Protocol capability Bandwidth & processing speed constrained Challenged with regard to: Logistics Interoperability Flexibility Compatibility with modernized key management (EKMS & KMI) Securing the Global Information Grid (GIG) Slide #7
8 DoD Crypto Mod Initiative (CMI) Vital effort to transform all NSA-certified, Type 1 Crypto solutions to meet the needs of the next generation warfighting environment cannot fight & win without crypto that protects C2 & data in transit DoD Type 1 Crypto Equipment transformation goals: Net-centric & Global-Information-Grid (GIG) compatibility Compatible w/ next generation Key Management Infrastructure (KMI) More robust, stronger algorithms Releasable versions of algorithms to warfighting partners Higher data rates & larger downloads Over-The-Network Re-keying (OTNR) capability Reprogrammable H/W enabling easier & less expensive upgrades Logistically supportable NSA Executive Agent -- all Services actively participating Securing the Global Information Grid (GIG) Slide #8
9 AF Crypto Modernization Legacy Systems Modernized Systems Transparent, Cross-Cutting Solutions P l a t f o r m s Equipment (Radio) Device (Crypto Hardware) Engine (Chip) A l g o r i t h m Increased Security Robustness Programmability Advanced Algorithms Interoperability Releasability Key Management Infrastructure Compatibility Global Info Grid Secure Information for Net-Centric Ops Technology Infusion Securing the Global Information Grid (GIG) Slide #9
10 AF Crypto Mod Program Office Est. 7 December 2001 Enterprise management CM Acquisition Policy, Guidance, & Strategic Planning Promote AF Awareness, coordinate w/ other Services & NSA Manage portfolio funding w/ Lead Command & Air Staff Analysis -- Ensure crypto is secure & supportable Understand crypto inventory & platform usage Analyze decertification & AF way ahead Track current / future tech development Partner for risk reduction & concept technology development Facilitate NSA security evaluation & certification Program planning -- Initial planning for: Concept refinement Development Production & deployment Securing the Global Information Grid (GIG) Slide #10
11 AF Crypto Mod Acquisition Structure AF SAE SAF/XCI SAF/AQI AFSPC 24 AF AFNIC AF PEO C2 & CS SPM National Crypto Solutions Management Office User Community KG-3X Crypto Mod AF CMPO Program Management Offices Industry Industry Industry Industry ICBM Crypto Upgrade IFF Mode 5 Crypto Space TT&C AVE Industry Industry Industry Industry Industry Industry Industry Industry Remote Re-Key Combat Key Generator Space Mission Data VINSON ANDVT Crypto Space TT&C GOE Securing the Global Information Grid (GIG) Slide #11
12 AF Crypto Mod Phased Approach Replacement: Near term sustainability issues Nuclear C2 Crypto (KG-3X & KS-60) IFF Mode 5 Crypto Remote Re-key (RRK) Combat Key Generator (CKG) Modernization: Incremental improvement & reduced logistics Space Telemetry, Tracking, & Commanding (TT&C) Space Mission Data (SMD) VINSON/ANDVT Crypto Mod (VACM) Transformation: Common network-centric crypto solutions Remote Operational Management of End-Crypto-Units (ROME) Multi-Level Security (MLS) Dynamic Group Keying (DGK) Common Interface to Cryptographic Modules (CICM) Miniaturized & Software Crypto Securing the Global Information Grid (GIG) Slide #12
13 AF Crypto Mod Other Areas of Interest Link Encryption Family (LEF) F-22 Multi-Function Crypto Programmable Objective Encryption Technologies (POET) Navy-led Link-16 Encryption Modernization Multiple studies Securing the Global Information Grid (GIG) Slide #13
14 AF CM Challenges Technical Size, Weight & Power (SWaP) Software-based crypto NSA certification / decertification requirements Funding Cuts to military budget (-) Increasing emphasis on security (+) Increasing emphasis on cyber capabilities (+) Programmatic Ever-changing acquisition process (-) New acquisition framework (+) Securing the Global Information Grid (GIG) Slide #14
15 AF CM Way Ahead Common solutions for legacy & future systems Reduced size, weight & power High assurance, high speed & anti-tamper Multi-Level Security & dynamic group keying High assurance storage encryption Continue to evolve & capitalize on PKI Transition plan from EKMS to KMI Anticipate emerging threats & participate in Air Force Cyber response Securing the Global Information Grid (GIG) Slide #15
16 Point of Contact Crypto Mod Program Office Sue Hooker, CPSG/ZX Crypto Mod Program Office Program Action Group, Govt Lead Commercial Phone: (210) , DSN: Or Securing the Global Information Grid (GIG) Slide #16
17 Questions? Securing the Global Information Grid (GIG) Slide #17
18 Back-Ups Securing the Global Information Grid (GIG) Slide #18
19 Electronic Key Management System(EKMS) Key Management Infrastructure(KMI) SCOPE: Transactions per month F-15 requires 18 keys F-22 & JSF: 450 keys AEHF: 100,000 keys PROGRAM CONTENT: Provides electronic key generation, distribution, accounting, & management EKMS based on phone networks & requires significant human hands-on management KMI ensures modernized, AF-compliant networked operation for cryptographic key management Enables warfighter Joint interoperability/ reachback Decreases human intelligence threat (HUMINT) Cuts production costs for NSA & shipment costs for Services AF Key Management growth areas: GPS equipment, secure cell phones, network encryptors, national agency & Coalition customers Securing the Global Information Grid (GIG) Slide #19
20 Space COMSEC Airborne C2 & ISR Assets Med/High Alt UAVs SCOPE: JSOAC CFSOCC CSAR Forces Units Small UAVs Ground-based Sensors SOF Teams National Assets Sensored SOF Platforms Supports development, production, launch & operations of 15 satellite programs PROGRAM CONTENT: Provides warfighter secure, uninterrupted satellite communications, 24/7 ISR, & near real-time NAV / positioning & weather data Protects Command & Control of critical national assets Encrypts information collected or passed by satellite (mission data) Securing the Global Information Grid (GIG) Slide #20
21 Air & Ground COMSEC PROGRAM CONTENT: Ensures AF warfighters communicate securely in any environment or media Replaces legacy link encryptors & aging in- line network encryptors SCOPE: - Sustains entire AF cryptographic inventory over 1,200 device types -Supports all AF bases fixed & deployed Modernized KIV-7M & KIV-19M point-to-point encryptors High Assurance IP Encryptors (HAIPE) In-line encryptors HAIPEs ensure compliancy with the National Security Telecom & Information Systems Security Policy (NSTISSP) No. 11 Securing the Global Information Grid (GIG) Slide #21
Forecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
Space and Naval Warfare Systems Center Atlantic
Space and Naval Warfare Systems Center Atlantic Small Business and Industry Outreach Initiative (SBIOI) Twenty-Seventh Quarterly Symposium 31 January 2013 Mr. Charles Adams Transport & Computing Infrastructure
WEEKLY SCHEDULE (as of 01 Mar 16)
WEEKLY SCHEDULE (as of 01 Mar 16) Monday 0700 0800 LATE/WALK IN REGISTRATION EYE OPENER 0800 0830 Welcome~Introduction~Administration Notes USPACOM 0830 0900 Active Shooter USPACOM 0900 0930 Breakout Setup
Office of Warfighting Integration and Chief Information Officer SAF/CIO A6. Mission Brief
Office of Warfighting Integration and Chief Information Officer SAF/CIO A6 Mission Brief AF Mission The mission of the United States Air Force is to fly, fight and win in air, space and cyberspace. 2 Continue
Advanced Systems & Development
Advanced Systems & Development Transitioning to an Enterprise Ground System Lt Col Matt Kimsal SMC/ADY Envisioning and Shaping the Future of Space BLUF SMC/AD is generating a plan for the transformation
The future of range instrumentation.
ROCKWELL COLLINS Common Range Integrated Instrumentation System (CRIIS) The future of range instrumentation. A proven solution for accurately testing next-generation weapon systems. The speed and accuracy
Mobile Applications. Army s Direction and Our Challenges
Mobile Applications Army s Direction and Our Challenges AFCEA LUNCHEON 16 March 2011 Pete Marion APEO for Customer Support Purpose Who are the major players in the Army for Digital Applications? What are
The DoD CIO Charter:
George Mason University, Fairfax, VA The DoD CIO Charter: A Template for I.T. Governance? Paul A. Strassmann,October 3, 2005 1 Authority for the DoD CIO 2 Traditional Views of the CIO Roles 3 An Expansive
G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE
G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs
Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, 2003. Internal Information Services
Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, 2003 Internal Information Services Outline Background Northrop Grumman Service Business Models Service as primary
AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration
Headquarters Air Combat Command AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration This Briefing is: UNCLASSIFIED Mr. John Vona, GS-15 AFC2IC/C2P Purpose Discuss
Systems Engineering and Integration Efforts. 11 Dec 2013
Systems Engineering and Integration Efforts 11 Dec 2013 Mr. Leo Smith Director, PoR Engineering Support ASA(ALT) System of Systems Engineering & Integration Directorate (SOSE&I) Approved for Public Release;
Overview of NATO Technology Trends
Overview of NATO Technology Trends Interoperability MIL + GOV devices; ED FN and ED MC Roadmap Jan Leduc Rohde & Schwarz SIT Prague, 01.04.2015 Agenda ı NATO Technology Trends & Interoperability SCIP NINE
CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense
CONNECT PROTECT Communication, Networking and Security Solutions for Defense Engage Communication provides Defense, Homeland Security and Intelligence Communities with innovative and cost effective solutions
The State of DoD Biometrics
The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E [email protected] 1 Agenda What We ve Done Biometrics
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003
Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise (GES) Mr. Rob Walker 24 September 2003 Common Operating Environment COE is mission-application independent - A basis for
UNCLASSIFIED. UNCLASSIFIED Navy Page 1 of 20 R-1 Line #208
Exhibit R2, RDT&E Budget Item Justification: PB 2015 Navy Date: March 2014 1319: Research, Development, Test & Evaluation, Navy / BA 7: Operational Systems Development COST ($ in Millions) Prior Years
Army Intelligence Industry Day Foundation Layer Technology Focus Areas
CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,
Corporate Overview A
Corporate Overview A WHO WE ARE ManTech International Corporation uses advanced technology to help government and industry meet some of their greatest challenges and succeed in their most important endeavors.
Department of Defense Net-Centric Services Strategy
Department of Defense Net-Centric Services Strategy Strategy for a Net-Centric, Service Oriented DoD Enterprise March 2007 Prepared by the DoD CIO FOREWORD The Internet has facilitated an e-commerce explosion
UNCLASSIFIED R-1 ITEM NOMENCLATURE
Exhibit R-2, RDT&E Budget Item Justification: PB 213 Army DATE: February 212 24: Research, Development, Test & Evaluation, Army COST ($ in Millions) FY 211 FY 212 PE 33142A: SATCOM Ground Environment FY
DISA Testing Services for the Enterprise. Luanne Overstreet
DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information
WHITE PAPER COMBATANT COMMAND (COCOM) NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B
COMBATANT COMMAND () NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B TABLE OF CONTENTS COMBATANT COMMAND () NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B NSA COMMERCIAL SOLUTION FOR CLASSIFIED
COMBATSS-21 Scalable combat management system for the world s navies
COMBATSS-21 Scalable combat management system for the world s navies The COMBATSS-21 total ship combat management system was designed to deliver capability rapidly and affordably. Built on an open architecture,
Space Ground Services in the Joint Information Environment (JIE)
Space Ground Services in the Joint Information Environment (JIE) Scott Niebuhr, Jeremy Burton, Judy Kerner, Sky Troyer The Aerospace Corporation 2015 The Aerospace Corporation Space Ground Services in
Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0
Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0 Volume I Management Overview of the DoD IEA July 2012 Prepared by: Department of Defense Office of the Chief Information
UNCLASSIFIED R-1 ITEM NOMENCLATURE
COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete Total Cost Total Program Element 9.986 10.218 19.380-19.380 19.060 19.332 19.217 19.405 Continuing Continuing
L-3 Guardian SME PED Frequently Asked Questions
1. What is L-3 Guardian and why do I want one? L-3 Guardian was developed under the NSA Secure Mobile Environment Personal Electronic Device (SME PED) Program. L-3 Guardian is a wireless handheld PDA which
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
UNITED STATES AIR FORCE. Air Force Product Support Enterprise Vision
UNITED STATES AIR FORCE Air Force Product Support Enterprise Vision July 2013 Foreword Product Support is a set of functions and products that enables operational capability and readiness of systems, subsystems,
ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE
ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality
Satellite REPRINTED FROM. John D. Prentice, Stratos Global Corp., USA, www.oilfieldtechnology.com
Satellite solutions John D. Prentice, Stratos Global Corp., USA, discusses how new satellite solutions impact offshore and land based exploration and production. REPRINTED FROM www.oilfieldtechnology.com
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
Director of Intelligence Proposed Research Topics
Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC 20350-3000 Sept 2011 DIRINT Suggested Graduate Program Thesis
Innovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence
Innovation. Performance. Security SMARTSCAN man-portable land EW solutions target up-to-the-minute situational intelligence The increasing demands of Electronic Warfare As the digital era takes hold, the
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement 1.0 INTRODUCTION The Department of the Navy Space and Naval Warfare Systems
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8115.01 October 10, 2005 ASD(NII)/DoD CIO SUBJECT: Information Technology Portfolio Management References: (a) Subtitle III of title 40, United States Code (formerly
DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO
DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes
FM 6-02 SIGNAL SUPPORT TO OPERATIONS
FM 6-02 SIGNAL SUPPORT TO OPERATIONS JANUARY 2014 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at
( Increased usage of IP addresses )
IPv6 Applications IPv6: Make Possible Internet of Things More Devices than people Smart phones Smart Tablets Traditional Internet desktops Data-enabled mobile phones Consumer appliances Embedded systems
Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)
Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
Secure information exchange
www.thales.no Secure information exchange 2 together. Safer. Everywhere. Whenever critical decisions need to be made, Thales has a role to play. In all its markets aerospace, space, ground transportation,
Inmarsat Global Xpress Global, Mobile, Trusted. U.S. Government > Services > Global Xpress
Inmarsat Global Xpress Global, Mobile, Trusted. U.S. Government > Services > Global Xpress The New Standard in Mobile Satellite Communications As a long-trusted partner of the U.S. government sector, we
Unified Capabilities (UC)
Unified Capabilities (UC) Lisa Belt UC Portfolio Manager DISA 14 May 2014 1 2 Unified Capabilities -- What Do We Mean? Unified Capabilities Consolidate Phone Switches Streamline IP Video Peer w/commercial
TECHNIQUES FOR COMMUNICATIONS SECURITY (COMSEC) OPERATIONS. August 2015
ATP 6-02.75 TECHNIQUES FOR COMMUNICATIONS SECURITY (COMSEC) OPERATIONS August 2015 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY
UNCLASSIFIED. UNCLASSIFIED Defense Information Systems Agency Page 1 of 9 R-1 Line #131
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Defense Information s Agency : March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 5: Development & Demonstration (SDD) COST
Department of Defense PKI Use Case/Experiences
UNCLASSIFIED//FOR OFFICIAL USE ONLY Department of Defense PKI Use Case/Experiences PKI IMPLEMENTATION WORKSHOP Debbie Mitchell DoD PKI PMO [email protected] UNCLASSIFIED//FOR OFFICIAL USE ONLY Current
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
White Paper. Five Steps to Firewall Planning and Design
Five Steps to Firewall Planning and Design 1 Table of Contents Executive Summary... 3 Introduction... 3 Firewall Planning and Design Processes... 3 Step 1. Identify Security Requirements for Your Organization...
Turn Your Business Vision into Reality with Microsoft Dynamics NAV. icepts Technology Group, Inc. Dynamics NAV Gold ERP Partner www.icepts.
Turn Your Business Vision into Reality with Microsoft Dynamics NAV icepts Technology Group, Inc. Dynamics NAV Gold ERP Partner www.icepts.com You have worked hard to build a vision for your business. With
Fort Monmouth Programs
Fort Monmouth Programs By: Igal Sharret President, TELEGRID Technologies, Inc. [email protected] 973-994-4440 A Technologies in Perspective Article Published in the Association of the United States
SatCom For Net-Centric Warfare July/August 2011. MilsatMagazine
SatCom For Net-Centric Warfare July/August 2011 MilsatMagazine Emergency Communications C-COM, Hughes Boeing GPS II-F IvySys Technologies Command Center Guardian Mobility idirect Government Technologies
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
AUDIT REPORT. Audit of NRC s Communications Security Program. OIG-14-A-21 September 29, 2014
AUDIT REPORT Audit of NRC s Communications Security Program OIG-14-A-21 September 29, 2014 All publicly available OIG reports (including this report) are accessible through NRC s Web site at: http:/www.nrc.gov/reading-rm/doc-collections/insp-gen/
Intelligent Solutions for the Highest IT Security Demands
Intelligent Solutions for the Highest IT Security Demands 3 Information security from the architects of modern cryptographic systems SINA (Secure Inter-Network Architecture) enables the protected processing,
Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise
Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:
PEO SYSCOM Conference Joint Pgm Management Perspective
Defense rmation Systems Agency A Combat Support Agency PEO SYSCOM Conference Joint Pgm Management Perspective Brigadier General Pete Hoene, USAF Program Executive Officer Command & Control Capabilities
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 9410.5C N2/N6 OPNAV INSTRUCTION 9410.5C From: Chief of Naval Operations Subj: NAVY
Small Business Programs Conference. Technical, Engineering, Advisory, and Management Support (TEAMS)
Small Business Programs Conference Technical, Engineering, Advisory, and Management Support (TEAMS) August 14, 2015 Presented by: James Weinberger Slide 1 Source Selection Sensitive Acquisition Overview
AUSA Background Brief
AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of
DISA Acquisition Opportunities
DISA Acquisition Opportunities 2014 Forecast to Industry 1 CAE Acquisition Opportunities GCCS-J Program support Base year and one 1 year option with total estimated value of $5M Current PoP ends 28 Nov
Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure
Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure Presentation to the U.S. Department of Energy by the IEEE Joint Task Force on QER Trends: Resilience
DoD CIO ITSM Overview Enterprise Architecture Conference
DoD CIO ITSM Overview Enterprise Architecture Conference April 14, 2011 Barbara McCain Enterprise Architecture & Infrastructure DoD CIO [email protected] What is IT Service Management (ITSM)? ITSM
Power of Oracle in the Cloud
Power of Oracle in the Cloud www.reliason.com Whitepaper W Overview The Oracle technology is known for its power, productivity and robustness. Likewise, Oracle cloud service is also backed by these features
Start building a trusted environment now... (before it s too late) IT Decision Makers
YOU CAN T got HAP Start building a trusted environment now... IT Decision Makers (before it s too late) HAP reference implementations and commercial solutions are available now in the HAP Developer Kit.
UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base PE 0603755D8Z: High Performance Computing OCO Total FY
Bridging the Digital Divide with Net-Centric Tactical Services
Bridging the Digital Divide with Net-Centric Tactical Services Authors: Scott D. Crane, Charles Campbell, Laura Scannell Affiliation: Booz Allen Hamilton E-mail: [email protected] 1. Abstract The DoD
Deterrent and detection of smart grid meter tampering and theft of electricity, water, or gas
Deterrent and detection of smart grid meter tampering and theft of electricity, water, or gas Jeff McCullough Introduction This white paper was inspired by real concerns regarding smart grid electric meters
Security in the smart grid
Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable
Introduction MIND CTI. Overview
Introduction MIND CTI Founded in 1995, MIND CTI Ltd. is a public company (NASDAQ: MNDO), a leading global provider of Call Management solutions to the enterprise market, and Billing and Customer Care solutions
AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015
AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))
The Boeing Company Strategic Missile & Defense Systems
The Boeing Company Strategic Missile & Defense Systems Brad Bruce November 8, 2011 Boeing Business Units How SM&DS Fits Organizationally Boeing BDS Network & Space Systems Boeing Defense, Space & Security
Transmission Security (TRANSEC) in an IP-based VSAT Architecture. February 2011
Transmission Security (TRANSEC) in an IP-based VSAT Architecture February 2011 As the ability to monitor satellite transmissions grows more sophisticated, the need to implement increased levels of security
Future Multi-Mission Satellite Operations Centers Based on an Open System Architecture and Compatible Framework
Future Multi-Mission Satellite Operations Centers Based on an Open System Architecture and Compatible Framework GSAW 2014 Thomas J. Sullivan, Aerospace Ground Systems Lab Rico Espindola, MMSOC Flight Operations
secure For the ultimate in Cyber Defence TRL Technology
//Government secure Grade Network Security For the ultimate in Cyber Defence // CATAPAN Government Grade Network Security L-3 TRL has over a decade of experience in developing and supporting sophisticated
Qlik UKI Consulting Services Catalogue
Qlik UKI Consulting Services Catalogue The key to a successful Qlik project lies in the right people, the right skills, and the right activities in the right order www.qlik.co.uk Table of Contents Introduction
Operationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 4630.09 July 15, 2015 DoD CIO SUBJECT: Communication Waveform Management and Standardization References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues
Navy Information Dominance Industry Day
Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic
Partnering with Small Business
Partnering with Small Business Small Business Breakfast Ms. Essye Miller Director, Cyber Security, Army CIO/G-6 1 UNCLASSIFIED Army CIO/G-6 Organization CIO / G-6 Deputy, CIO / G-6 LTG Robert Ferrell Mr.
BT Unified Trading communication. The Future Delivered
BT Unified Trading communication The Future Delivered BT Unified Trading With BT Unified Trading, BT has set the benchmark for the next decade by bringing to market a powerful, cost-effective, software-based
How To Protect Your Data With A Senior Security Encryptor From Being Hacked By A Hacker
CCTV NETWORK ENCRYPTION SOLUTIONS-PAPER CCTV S ADVANCES AND INCREASED USE IN PUBLIC AND PRIVATE APPLICATIONS DEMAND RIGOROUS DATA PROTECTION. WHETHER CCTV NETWORK DATA PROTECTION IS REGULATED OR NOT, THE
i LCDR Peter Duffley Third Party Sales Officer / CAN Rep
Familiarization i LCDR Peter Duffley Third Party Sales Officer / CAN Rep Mr. Vincenzo Sferra Northrop Grumman INFORMATION NOT RELEASEABLE FOR COMMERCIAL USE OR BEYOND IMMEDIATE AUDIENCE WITHOUT PRIOR PERMISSION
Air Force Agency for Modeling & Simulation Mission Brief. Col James Spanky Dennis AFAMS Commander
Air Force Agency for Modeling & Simulation Mission Brief Col James Spanky Dennis AFAMS Commander Organizational Structure Executive Services Mr. Bob Verica Financial Officer Mr. Joe Lawrence Commander
JCSS Web Demo Transcript
JCSS Web Demo Transcript Slides 1-2 In this web demo we will present the high level details of JCSS and the supporting Project. It will take roughly 25 minutes to complete. The demo will consist of several
COMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 33-217 27 MAY 2014 Communications and Information VOICE CALL SIGN PROGRAM COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications
Forecast to Industry 2015 External Contracting Opportunities
Forecast to Industry 2015 External Contracting Opportunities Mr. Douglas W. Packard Director, Procurement Services Directorate 2 November 2015 UNCLASSIFIED 109 103 ENCORE III Navy Maintenance Database
How To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
Attachment 1 DATA SERVERS AND DATA CENTERS APPROVAL PROCESS
Attachment 1 DATA SERVERS AND DATA CENTERS APPROVAL PROCESS 1. AF Data Center Infrastructure Management. Under the Federal Data Center Consolidation Initiative (FDCCI), OMB defines a data center as a closet,
