Enterprise Architecture in the Intelligence Community:

Size: px
Start display at page:

Download "Enterprise Architecture in the Intelligence Community:"

Transcription

1 Enterprise Architecture in the Intelligence Community: The Joint Architecture Working Group (JAWG) Randy Marks; Chair, Joint Architecture Working Group NSA/TE Deputy Chief System Engineer for Enterprise Architecture

2

3

4 KBs KBs Obtain Data Manage the Production Process Assess Options Obtain Data Manage the Production Process Assess Options Event Store IIB EP Process Data Manage Requirements Process Data Manage Requirements Analyze & Produce Intelligence Manage Customer Relations Analyze & Produce Intelligence Manage Customer Relations Event Store IIB EP Data Info KBs Collect Process Exploit Disseminate Task Intel KBs Tasking Planning & Tasking Obtain Data Manage the Production Process Assess Options Collection Processing Analysis Event Store IIB EP Requirements Process Data Manage Requirements Production & Dissemination Signal Data Info KBs Intel Acquire Data Analyze & Produce Intelligence Manage Customer Relations Targeting Process Data & Perform Cryptanalysis Tasking Coordinate Cryptologic Operations Perform Cryptologic Analysis INDB KBs Tailor & Deliver Results SIGDEV SIGDEV SIGDEV Data Info KBs Intel Tasking Planning & Tasking Collection Processing Analysis Requirements Production & Dissemination Obtain Data Manage the Production Process Assess Options Data Info KBs Intel Event Store IIB EP Process Data Manage Requirements Detect/ Find Strike/ Engage Analyze & Produce Intelligence Manage Customer Relations Data Info KBs Collect Process Exploit Disseminate Locate/ Fix Task Data Info KBs Assess Tasking Planning & Tasking Collection Processing Analysis Requirements Identify/ Track Decide/ Target Production & Dissemination Data Info KBs Intel Intel Detect/ Find Strike/ Engage Data Info KBs Locate/ Fix Assess Identify/ Track Decide/ Target Detect/ Find Strike/ Engage Detect/ Find Strike/ Engage Data Info KBs Locate/ Fix Assess Locate/ Fix Identify/ Track Decide/ Target Data Info KBs Assess Identify/ Track Decide/ Target Info Sharing/Integration is a grassroots effort not an enterprise principle Phone call, , word of mouth Warfighters are unaware of solutions Current implementation hampers Information Integration Point-to-point interfaces Inability to find information Service provider Private libraries Standards need to be enterprise focused National Tactical DCGS GSTs DCGS Intelligence JOINT ARCHITECTURE WORKING GROUP 4

5 Enterprise Architecture to the rescue! 5

6 UNCLASSIFIED//FOR OFFICIAL USE ONLY

7 The Architecture Trifecta The AS IS Architecture The To Be Architecture The Architecture Transition Plan - Roadmap JOINT ARCHITECTURE WORKING GROUP

8 Multiple ways to produce an architecture JOINT ARCHITECTURE WORKING GROUP 8

9 DOD Architecture Framework

10 Enterprise Architecture (circa 2006) * Acknowledgement to Dr. Scott Bernard, Introduction to Enterprise Architecture

11 The Joint Architecture Reference Model: 10 Layer Model Operational Drivers Abstract Models and Architectures used to build the lower layers People using IT that is provided below Operations-specific Services Software performing specific activities Undercarriage Services Enterprise -wide software and hardware services utilizing shared networks and facilities For unique mission capabilities, these layers may be dedicated to specific operations 10. Operational Objectives & Policies 9. Capability Areas (and Threads) 8. Enterprise Activities and Exchanges 7. Applications and Content 6. Software Frameworks and Content Structure 5. Enabling Services for Applications and Content 4. Computing and Storage Platforms (HW & OS) 3. Networks (OSI Layers 2 & 3) Security Data 2. Physical Connectivity Infrastructure (OSI Layer 1) 1. Facilities Infrastructure (Power, Space, & HVAC) JOINT ARCHITECTURE WORKING GROUP 11

12 Model Comparisons Other Enablers

13 Example of the way we did EA Enter the Joint Architecture Working Group JAWG 13

14 The JAWG s Objective to define the IC Federated Enterprise Architecture and provide tools to support IC Element and IC Enterprise investment (acquisition) decisions across the IC JOINT ARCHITECTURE WORKING GROUP 14

15 JAWG Timeline NRO NSA NGA ODNI DIA OUSD(I) CIA FBI DHS USN (N2) DoD CIO JCS Sep 08 Sep 08 Sep 08 Oct 08 Oct 08 Nov 08 Dec 08 Jan 09 Feb 09 Jul 09 Aug 09 Apr 10 Membership Significant Events May 08: NRO Ground transformation Aug 08: JSEF forms Dec 08: 1 st Community Review (IGCR) Sep 08: IC Architecture-focused forum established (JAWG) May 09: 2 nd Community Review (JAR); JAWG subsumed into IC CIO under ICI2P Oct 09: Community Status Review (JASR); JSEF became the Architecture Standards & Engineering Committee (ASEC) Mar 10: 3 rd Community Review (AER) Jul 10: IC Core TEM 1 Sep 10: IC Core TEM 2 Nov 10: Community Status Review (JICSR) Apr 11: DoD EA Conference JOINT ARCHITECTURE WORKING GROUP May 11: 4 th Community Review 15

16 JOINT ARCHITECTURE WORKING GROUP 16

17 The Joint Architecture Reference Model The Tools To be effective, we need to use the JARM in a standard way toward a shared goal JOINT ARCHITECTURE WORKING GROUP 17

18 The Joint Architecture Reference Model: 10 Layer Model Supports Top Down Specific Areas of Interest Bottoms Up JOINT ARCHITECTURE WORKING GROUP 18

19 The Joint Architecture Reference Model: 10 Layer Model JOINT ARCHITECTURE WORKING GROUP 19

20 The Joint Architecture Reference Model: 10 Layer Model JOINT ARCHITECTURE WORKING GROUP 20

21 Enterprise Competency Model (ECM) The ECM is a standard characterization of mission and business functions and activities It s a way to represent what our agencies do It s related to the FEA Business Reference Model Functions identified within the ECM represent Layer 8 Enterprise Activities and Exchanges The ECM introduces three concepts Enterprise Competencies Enterprise Components Accountability Levels The ECM provides a more in-depth representation of IC mission and business functions than the current IC BRM JOINT ARCHITECTURE WORKING GROUP 21

22 A Closer Look at the ECM JOINT ARCHITECTURE WORKING GROUP 22

23 Enterprise Services List (ESL) The ESL provides a mission/business-driven, functional framework classifying enterprise services ESL terminology is consistent with the FEA Service Reference Model Service Domains Service Types Service Components UNCLASSIFIED The ESL provides a more comprehensive list of enabling services for the IC JOINT ARCHITECTURE WORKING GROUP 23

24 The Joint Architecture Reference Model: 10 Layer Model JOINT ARCHITECTURE WORKING GROUP 24

25 So why do we care? 25

26 Start With A Common Language JOINT ARCHITECTURE WORKING GROUP 26

27 That s the Enterprise let s narrow our focus a bit more 27

28 A Federated Environment Enabling Information Integration Any data, any time, any place, usable by any authorized consumer; preventable only by law or policy, not technology. JOINT ARCHITECTURE WORKING GROUP 28

29 The IC Core Defined The IC Core is a focused set of joint & community services, specifications and standards, processes, and policies for enabling the Business of Intelligence for the federated Intelligence Community Enterprise IC Core elements must: be foundational enable the Business of Intelligence, and foster interoperability and integration The focus of the IC Core is on the technical service capabilities and discrete services JOINT ARCHITECTURE WORKING GROUP 29

30 IC Core Baseline Increment 1 Service Offerings Identity & Access (IdAM) Collaboration Content Discovery & Retrieval (CDR) Infrastructure Enablers General Enterprise Enablers Access Control Information Retrieval Network Document Categorization Digital Policy Organizational Messaging Subscriptions Communications Indexing Intrusion Prevention Cryptography Voice Communication Audio Conferencing Alerts & Notifications Data Exchange Enterprise Infrastructure Assessment Virus Protection Document Classification Security Classification Legend Service Offering IC Core Enterprise Service Component Enterprise Service Component Digital Resource Identification Audit Trail Capture & Analysis Forensics Identification and Authentication Digital Signature Computers / Automation Workgroup / Groupware Video Conferencing Computer / Telephony Integration Real-Time Chat Threaded Discussion Shared Calendaring Instant Messaging Personalization Community Document Library Task Text Messaging Multimedia Metadata Knowledge Distribution and Delivery Knowledge Categorization Precision / Recall Ranking Intrusion Detection Incident Response Cross Domain Data Transfer Requires synchronization with ESL Service Monitoring Service Discovery Service Publication Content Acquisition Directory Services Workforce / Directory Locator Information Mapping / Taxonomy Mission Assessment Personnel Administration JOINT ARCHITECTURE WORKING GROUP 30

31 So we ve got another framework, another taxonomy What do we do with it? 31

32 Need to make acquisition decisions based on functions (capabilities) rather than individual programs So how do we use the JAWG products to better inform acquisition decisions? JOINT ARCHITECTURE WORKING GROUP 32

33 Enterprise Architecture to Investment Portfolio Alignment 10 Layer Architecture Model Information Portfolio (IP) Structure Agency Strategy Agency Concise Look Forward Investment Portfolio Strategy Agency Program Guidance Team Effort with SME support Agency Transformation Operations Enterprise Mgt Processing Exploitation Analytics Production Enterprise IT Enterprise Mgt Mission JOINT ARCHITECTURE WORKING GROUP 33

34 Overlaps, Possible Duplication, or areas of Common Concern Then look for hotspots or concentrations of activity Budget Center Bxxx Effort 1 Material Labor Mgmt, Sys Engr, HW Main, SW Dev Travel, Transportation & Supplies Infrastructure Facilities Effort 2 Material Labor Mgmt, Sys Engr, HW Main, SW Dev Travel, Transportation & Supplies Infrastructure Facilities Budget Center Byyy Effort 1 Material Labor Mgmt, Sys Engr, HW Main, SW Dev Travel, Transportation & Supplies Infrastructure Facilities Effort 2 Material Labor Mgmt, Sys Engr, HW Main, SW Dev Travel, Transportation & Supplies Infrastructure Facilities Operational objectives and policy layer Capability Areas and Thread Layer Enterprise Activites and Exchange Layer Accomplish the Mission A1 Coordinate Operations (1.2) A1.1 Manage Mission Resources & Capabilities A1.1.1 Provide Mission Planning A1.1.2 Manage Health, status and perfo A1.1.3Maintain Tradecraft A1.1.4 Provide target planning A Identify requirements A Command & Control A Manage Discovery A Provide IA Tasking A Endpoint Resources A1.1.5 Mange IA portfolio A1.1.6 Manage gig protfolio A1.2 Maintain implementation plans A1.3 Manage external relationships A1.3.1 Manage IA community education A1.3.2 Manage international relations A2 Direct Operations A2.1 Acquire Data A2.1.1 Provide Mission Planning A2.1.2 Manage Health, status and perfo A2.1.3Maintain Tradecraft A2.2 Process intercept A Select & promote objects A reconstruct packet streams A Create objects A Analyze objects A2.3 Process Data A2.3.1 Provide Mission Planning A2.3.2 Manage Health, status and perfo A2.3.3Maintain Tradecraft A Identify personnel information A transform processed data A Recognize activity of interest A3 Enable Analysis A3.1 Manage Mission Resources & Capabilities A3.1.1 Provide Mission Planning A3.1.2 Develop Analytic Techniques A3.1.3Maintain Tradecraft A3.1.4 Provide target planning A Identify requirements A Conduct Discovery A Manage Discovery A Display Results A (U)Perform Analysis A3.1.5 Mange IA portfolio A3.1.6 Understand Netorks A3.2 Maintain implementation plans A3.3 Apply Information Policy A3.3.1 Manage IA community education A3.3.2 Content Analysis Capability GAP! Mission Critical Capability but no evidence of financial support JOINT ARCHITECTURE WORKING GROUP 34

35 Within an Agency Programs A, B & C C A B What do I have on the floor? What do I have in Development? What areas am I doing research in?

36 So why not do it on a grander scale? UNCLASSIFIED 36

37 IC CIO Requirement for FY12 Program Build Exhibit 53 & 300 Mapping to the JARM Exhibit 300 Data Required: Mapping to the ECM Required: Mapping to the ESL Exhibit 53 Data Optional: Mapping to the ECM Optional: Mapping to the ESL Required pre-2010 Reporting data for the FYDP, not just a single FY Percentage of the Budget allocated to the BRM Percentage of the Budget allocated to the SRM JOINT ARCHITECTURE WORKING GROUP 37

38 JARM Enterprise Competency Model (ECM) JARM Enterprise Services List (ESL) Service Types Customer Relationship Customer Preferences Customer Initiated Assistance Tracking & Workflow Routing & Scheduling of Process Organizational Investment Supply Chain Content Document Knowledge Records Analysis & Statistics Mission Performance Inelligence Analysis Visualization Knowledge Discovery Business Inelligence Reporting Data Human Resources Financial Service Domain Customer Services Process Automation Services Business Services Digital Asset Services Business Analytics Services Back Office Services Support Services Service Components Assets / Materials Development & Integration Human Capital / Workforce Security Collaboration Search Communication Systems Forms Service JOINT ARCHITECTURE WORKING GROUP 38

39 All (22) Ex 300 Programs Mapped to ESL for FY12 (U) Do the circled boxes indicate potential critical business service gaps? We do not know. Data set is incomplete. Service Types Customer Relationship Customer Preferences Customer Initiated Assistance Tracking & Workflow Routing & Scheduling of Process Organizational Investment Supply Chain Content Document Knowledge Records Analysis & Statistics Mission Performance Inelligence Analysis Service Domain Customer Services Process Automation Services Business Services Digital Asset Services Business Analytics Services Back Office Services Visualization Support Services (U) ESL Component Multi-Lingual Support defines the set of capabilities that allow access to data and information in multiple languages Service Components Knowledge Discovery Business Inelligence Reporting Data Human Resources Financial Assets / Materials Development & Integration Human Capital / Workforce Security Collaboration Search Communication Systems Forms Service JOINT ARCHITECTURE WORKING GROUP 39

40 Most Common JARM ESL Mappings in Ex 300s for FY12 At least five (out of six) of the reporting agencies mapped to each of the following service components for FY12 within the JARM ESL: Product Customer/Account Alerts and Notifications Process Tracking Requirements Program/Project Governance/Policy Quality Business Rule Risk Procurement Invoice Requisition Track/Approve Library Storage Document Creation/Validation Information Retrieval Information Mapping/Taxonomy Information Sharing Knowledge Capture Document Classification Ad-Hoc Standardized/Canned Data Exchange Data Warehouse Data Recovery Data Access Cross Domain Data Transfer Software Development Identification and Authentication Access Control Query Systems Engineering Mapping of all Ex 300 reporting programs across the community highlights areas where the IC might collaborate today in our respective development efforts The heat map shows all service component mappings across all six agencies [for illustration only] (Source: Exhibit 300s) JOINT ARCHITECTURE WORKING GROUP 40

41 ESL Mapping Snapshot: IC Core Overlay (U) The circled boxes indicate Enterprise Service components in which 1 or fewer of the 6 reporting agencies are investing. (Exhibit 300s, FY12) Service Domain. Customer Services Process Automation Services Business Services Digital Asset Services Business Analytics Services Back Office Services Support Services Service Types Customer Relationship Customer Preferences Customer Initiated Assistance Tracking & Workflow Routing & Scheduling of Process Organizational Investment Supply Chain Content Document Knowledge Records Analysis & Statistics Mission Performance Inelligence Analysis Visualization Service Components Knowledge Discovery Business Inelligence Reporting Data Human Resources Financial Assets / Materials Precision / Recall Ranking Defines the set of capabilities that support selection and retrieval of records ranked to optimize precision against recall. Development & Integration Human Capital / Workforce Security JOINT ARCHITECTURE WORKING GROUP Collaboration Search Communication Systems Forms Service 41

42 Less than 5% of the budget accounted for in the Exhibit 300 s yet we still find overlaps in capability. Think about what we might find if everything was aligned to a common framework 42

43 Some Final Thoughts regarding IT Efficiencies and Enterprise Architecture Where will the cost savings come from? 43

44 People attending the conference ~600 Annual Loaded Cost to Government ($300K/per year) $180,000,000/year ($300K per contractor, $250K per govie, say, 2/3 of audience is contractor, 1/3 govie) $120,000,000 + $ 50,000, $170,000,000/year Associated Activity: Architecture 50% to 75% of an Agency s budget goes to manpower! 44

45 JOINT ARCHITECTURE WORKING GROUP 45

46 The Bottom Line on the JAWG We work together collaboratively Each IC Element has unique skills and abilities, that when combined with other IC Elements respective skills and abilities supports the overarching Mission of the Intelligence Community IT is all about providing agility for the Mission; a force multiplier! Our JARM tools can scale and are usable at multiple levels of an organization/enterprise/community, for many different perspectives. It is all about providing any data, any time, any place, usable by any authorized consumer; preventable only by law or policy, not technology. JOINT ARCHITECTURE WORKING GROUP 46

47 For More Information: JAWG on Intelink: (JWICS) (NIPR) More Questions: JOINT ARCHITECTURE WORKING GROUP

48 Questions The greater danger for most of us lies not in setting our aim high and falling short; but in setting our aim too low, And achieving our mark. Michelangelo JOINT ARCHITECTURE WORKING GROUP 48

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

Managing Open Source Code Best Practices

Managing Open Source Code Best Practices Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate

More information

Accenture Cyber Security Transformation. October 2015

Accenture Cyber Security Transformation. October 2015 Accenture Cyber Security Transformation October 2015 Today s Presenter Antti Ropponen, Nordic Cyber Defense Domain Lead Accenture Nordics Antti is a leading consultant in Accenture's security consulting

More information

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007

More information

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network

More information

Federal Segment Architecture Methodology (FSAM): An Overview

Federal Segment Architecture Methodology (FSAM): An Overview Information Resources Management College Federal Segment Architecture Methodology (FSAM): An Overview Dr. Stan Boddie & Prof. Matt Newman 1 a global learning community for government s most promising information

More information

DATE REVISION xxxbyxxx. IT Modernization: EA Information Management. DATE: September 2003 AUTHOR: Enterprise Architecture Team

DATE REVISION xxxbyxxx. IT Modernization: EA Information Management. DATE: September 2003 AUTHOR: Enterprise Architecture Team DATE REVISION xxxbyxxx IT Modernization: EA Information Management DATE: September 2003 AUTHOR: Enterprise Architecture Team 1.0 Introduction It is the policy of the United States Government that executive

More information

Building an Effective Roadmap

Building an Effective Roadmap Building an Effective Roadmap Jason Tanner Senior Consultant, Enthiosys Motivated from Within Thank you to our sponsors 2 Agenda What is an effective roadmap? What are roadmap benefits? Why do roadmaps

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3115.12 August 24, 2010 USD(I) SUBJECT: Open Source Intelligence (OSINT) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes policy, assigns

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

AgriLife Information Technology IT General Session January 2010

AgriLife Information Technology IT General Session January 2010 AgriLife Information Technology IT General Session January 2010 Agenda Topics Year in Review Enterprise IT Services Update FirstCall Overview and Next Steps Sophos Antivirus Initiative Update Information/

More information

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation Briefing Outline Overview of the CUI Program Establishment of the Program Elements of the CUI Executive Order Categories and Registry Handling CUI Current Efforts Implementation Plan CUI and IT Implementation

More information

Defense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability

Defense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability Defense Information Systems Agency Identity and Access Management (IdAM): Consistent Access to Capability 17 August 2011 Disclaimer The information provided in this briefing is for general information

More information

Federal Enterprise Architecture Using EA to Design Future-Ready Agencies and Implement Shared Services

Federal Enterprise Architecture Using EA to Design Future-Ready Agencies and Implement Shared Services Federal Enterprise Architecture Using EA to Design Future-Ready Agencies and Implement Shared Services Scott A. Bernard, Ph.D. [email protected] Federal Chief Enterprise Architect Executive Office

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8440.01 December 24, 2015 DoD CIO SUBJECT: DoD Information Technology (IT) Service Management (ITSM) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority

More information

NFMV Enterprise Architecture. Navy Full Motion Video

NFMV Enterprise Architecture. Navy Full Motion Video NFMV Enterprise Architecture Navy Full Motion Video Setting the stage for an enterprise solution DOMAIN PROBLEM July 16, 2012 What Happened? Small vessel turns towards USNS USNS USNS security forces fire

More information

Army Intelligence Industry Day Foundation Layer Technology Focus Areas

Army Intelligence Industry Day Foundation Layer Technology Focus Areas CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:

More information

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8115.01 October 10, 2005 ASD(NII)/DoD CIO SUBJECT: Information Technology Portfolio Management References: (a) Subtitle III of title 40, United States Code (formerly

More information

Process Validation Workshops. Overview Session

Process Validation Workshops. Overview Session Process Validation Workshops Overview Session 2 Session Objectives: Prepare staff for participating in a Process Validation Workshop Clarify the Purpose of Process Validation Workshops Clarify Expected

More information

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT PAGE 6 of 51 SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Statement of Work This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive

More information

V ID E O A N A LYT ICS

V ID E O A N A LYT ICS O SI A N D T HE P OWE R V ID E O A N A LYT ICS C A PA B I L IT IE S O F SOLUTION BRIEF OSI and Video Analytics Technical Capabilities Founded in 1996, Organizational Strategies, Inc. (OSI) offers a portfolio

More information

NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC

NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC Committee on National Security Systems 1 CNSSD No. 507 January 2014 NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC

More information

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING BACKGROUNDER Point of Contact: Mr. James L. Lindsey (703) 704-0194 [email protected] PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING Product Director, Enterprise Content,

More information

Integrated Investment Decision Making at the Veterans Health Administration (VHA)

Integrated Investment Decision Making at the Veterans Health Administration (VHA) Integrated Investment Decision Making at the Veterans Administration (VHA) Troux Worldwide Conference April Ian Komorowski, Deputy Director, Business Architecture (BA) Jim Sant Amour, Office of Strategic

More information

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations

More information

Introduction to NICE Cybersecurity Workforce Framework

Introduction to NICE Cybersecurity Workforce Framework Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,

More information

Using Open Source Software to Manage Policies and Clinical Guidelines. Library & Knowledge Service Derby Teaching Hospitals NHS Foundation Trust

Using Open Source Software to Manage Policies and Clinical Guidelines. Library & Knowledge Service Derby Teaching Hospitals NHS Foundation Trust Using Open Source Software to Manage Policies and Clinical Guidelines Library & Knowledge Service Derby Teaching Hospitals NHS Foundation Trust Overview Background Existing System. Requirements. Implementation

More information

Improved Mapping and Modeling of Defense Domain Architectures Backup slides

Improved Mapping and Modeling of Defense Domain Architectures Backup slides Improved Mapping and Modeling of Defense Domain Architectures Backup slides Benton Ben K Bovée Senior Enterprise Architect Principal, Patterndigm 26 Apr 2012, 11:15-12:00 DM2 on IDEF0 Slide 2 Reference:

More information

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)

More information

Tuesday, September 11, 2007-12:17 AM Page 1 of 8

Tuesday, September 11, 2007-12:17 AM Page 1 of 8 Exhibit 300: Capital Asset Plan and Case Summary Part I: Summary Information And Justification (All Capital Assets) Section A: Overview (All Capital Assets) 1. Date of Submission: 9/10/2007 2. Agency:

More information

Fusion Center Technology Resources Road Map: Elements of an Enterprise Architecture for State and Major Urban Area Fusion Centers

Fusion Center Technology Resources Road Map: Elements of an Enterprise Architecture for State and Major Urban Area Fusion Centers Fusion Center Technology Resources Road Map: Elements of an Enterprise for State and Major Urban Area Fusion Centers General Overview The function of a fusion center is to provide a collection, analysis,

More information

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network 10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8320.05 August 18, 2011 ASD(NII)/DoD CIO SUBJECT: Electromagnetic Spectrum Data Sharing References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3115.10E March 24, 2006 USD(I) SUBJECT: Intelligence Support to Personnel Recovery References: (a) Title 10, United States Code (b) Title 50, United States Code

More information

P/T 2B: 2 nd Half of Term (8 weeks) Start: 24-AUG-2015 End: 18-OCT-2015 Start: 19-OCT-2015 End: 13-DEC-2015

P/T 2B: 2 nd Half of Term (8 weeks) Start: 24-AUG-2015 End: 18-OCT-2015 Start: 19-OCT-2015 End: 13-DEC-2015 2015-2016 SPECIAL TERM ACADEMIC CALENDAR For Scranton Education Online (SEOL), Masters of Business Administration Online, Masters of Accountancy Online, Health Administration Online, Health Informatics

More information

4. Objective. To provide guidelines for IS requirements and LCM support under NMCI.

4. Objective. To provide guidelines for IS requirements and LCM support under NMCI. d. To apply basic policy and principles of computer hardware and software management as they relate to Information Management and Information Technology (IMIT) and Information Systems (IS) associated with

More information

How To Improve The Defense Communications System

How To Improve The Defense Communications System Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial

More information

Lead Provider Framework Draft Scope. NHS England / 13/12/13 Gateway Ref: 00897

Lead Provider Framework Draft Scope. NHS England / 13/12/13 Gateway Ref: 00897 Lead Provider Framework Draft Scope NHS England / 13/12/13 Gateway Ref: 00897 1 Introduction The commissioning support lead provider framework is being developed in response to requests from CCGs for a

More information

Homeland Security Grants Management Louisiana Emergency Preparedness Association (LEPA)

Homeland Security Grants Management Louisiana Emergency Preparedness Association (LEPA) Homeland Security Grants Management Louisiana Emergency Preparedness Association (LEPA) An LEM Basic Credentialing Course 1 Objectives Using local government management systems perform: Homeland security

More information

HHSN316201200042W 1 QSSI - Quality Software Services, Inc

HHSN316201200042W 1 QSSI - Quality Software Services, Inc ARTICLE C.1. STATEMENT OF WORK This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and Human Services (DHHS), and all other federal agencies to acquire

More information

Computing & Telecommunications Services Monthly Report March 2015

Computing & Telecommunications Services Monthly Report March 2015 March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex [email protected] www.wright.edu/cats/ Last Modified

More information

NAVSEA Enterprise Resource Planning Overview March 2011

NAVSEA Enterprise Resource Planning Overview March 2011 NAVSEA Enterprise Resource Planning Overview March 2011 Mark Montella NUWC Newport ERP Site Implementation Lead 7 Months Until NAVSEA WCF Go-Live Navy Navy ERP ERP What is it? Navy Enterprise Resource

More information

Anatomy of an Enterprise Software Delivery Project

Anatomy of an Enterprise Software Delivery Project Chapter 2 Anatomy of an Enterprise Software Delivery Project Chapter Summary I present an example of a typical enterprise software delivery project. I examine its key characteristics and analyze specific

More information

The State of DoD Biometrics

The State of DoD Biometrics The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E [email protected] 1 Agenda What We ve Done Biometrics

More information

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs

More information

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison

More information

SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article A.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen

More information

ARIS 9ARIS 9.6 map and Future Directions Die nächste Generation des Geschäftsprozessmanagements

ARIS 9ARIS 9.6 map and Future Directions Die nächste Generation des Geschäftsprozessmanagements ARIS 9ARIS 9.6 map and Future Directions Die nächste Generation des Geschäftsprozessmanagements Dr. Katrina Simon ARIS Product Management 2014 Software AG. All rights reserved. ARIS @ Software AG 2M END

More information

HP Service Manager software

HP Service Manager software HP Service Manager software The HP next generation IT Service Management solution is the industry leading consolidated IT service desk. Brochure HP Service Manager: Setting the standard for IT Service

More information

Establishing and Governing an Enterprise Document Management System

Establishing and Governing an Enterprise Document Management System Establishing and Governing an Enterprise Document Management System PRESENTED BY: Keith Fournier, PMP, CMS, GISP Lucas County Information Services Auditor s Real Estate Information System Introduction

More information

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen

More information

DoD CIO ITSM Overview Enterprise Architecture Conference

DoD CIO ITSM Overview Enterprise Architecture Conference DoD CIO ITSM Overview Enterprise Architecture Conference April 14, 2011 Barbara McCain Enterprise Architecture & Infrastructure DoD CIO [email protected] What is IT Service Management (ITSM)? ITSM

More information

Applying Business Architecture to the Cloud

Applying Business Architecture to the Cloud Applying Business Architecture to the Cloud Mike Rosen, Chief Scientist Mike.Rosen@ WiltonConsultingGroup.com Michael Rosen Agenda n What do we mean by the cloud? n Sample architecture and cloud support

More information

DLA Balanced Scorecard. Janet Foote Senior Strategic Planner 16 December 2004

DLA Balanced Scorecard. Janet Foote Senior Strategic Planner 16 December 2004 DLA Balanced Scorecard Janet Foote Senior Strategic Planner 16 December 2004 Today s Session Defense Logistics Agency s Scorecard Defense Information Systems Agency s Scorecard Collaboration Benefits We

More information

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014 CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION Architecture Framework Advisory Committee November 4, 2014 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks and Introductions Shirley Ivan,

More information

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become

More information

Qi Liu Rutgers Business School ISACA New York 2013

Qi Liu Rutgers Business School ISACA New York 2013 Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,

More information

DoD Strategy for Defending Networks, Systems, and Data

DoD Strategy for Defending Networks, Systems, and Data DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July

More information

Marine Corps. Commercial Mobile Device Strategy

Marine Corps. Commercial Mobile Device Strategy Marine Corps Commercial Mobile Device Strategy April 2013 THIS PAGE INTENTIONALLY LEFT BLANK FOREWORD The currently constrained budget environment requires us to balance fiscal responsibility and mission

More information

DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE

DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE SOLUTION PLAN REQUIREMENTS ANALYSIS DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE Executive Summary The project will document campus requirements for IAM functionality and select and procure one or more technology

More information

Federal Enterprise Architecture Framework

Federal Enterprise Architecture Framework Resource Optimization Reporting January 29, 2013 Federal Enterprise Architecture Framework Version 2 Service Delivery Governance Current Views Human Capital Mgmt. (KSAs) Enterprise Strategic Plan/Goals

More information

DEFENSE BUSINESS SYSTEMS. Further Refinements Needed to Guide the Investment Management Process

DEFENSE BUSINESS SYSTEMS. Further Refinements Needed to Guide the Investment Management Process United States Government Accountability Office Report to Congressional Committees May 2014 DEFENSE BUSINESS SYSTEMS Further Refinements Needed to Guide the Investment Management Process GAO-14-486 May

More information

NICE Cybersecurity Workforce Framework Tutorial

NICE Cybersecurity Workforce Framework Tutorial NICE Cybersecurity Workforce Framework Tutorial Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy, DHS Outline

More information

Data Consolidation and Application Optimization (DCAO) Organization

Data Consolidation and Application Optimization (DCAO) Organization Data Consolidation and Application Optimization (DCAO) Organization 11 February 2015 Presented to: DON CIO IT Conference San Diego Convention Center Mr. John Pope DCAO Director Space and Naval Warfare

More information

Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Chapter 3 Internetwork E-Business Electronic Business

Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Chapter 3 Internetwork E-Business Electronic Business Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Chapter 3 Internetwork E-Business Electronic Business Applications. Internetworked E-business enterprises

More information

Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003

Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003 Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise (GES) Mr. Rob Walker 24 September 2003 Common Operating Environment COE is mission-application independent - A basis for

More information

U.S. Department of the Treasury. Treasury IT Performance Measures Guide

U.S. Department of the Treasury. Treasury IT Performance Measures Guide U.S. Department of the Treasury Treasury IT Performance Measures Guide Office of the Chief Information Officer (OCIO) Enterprise Architecture Program June 2007 Revision History June 13, 2007 (Version 1.1)

More information

GIS DESIGN AND IMPLEMENTATION SERVICES

GIS DESIGN AND IMPLEMENTATION SERVICES 22-1 21 24 23 22 30 32 25 33 29 34 28 35 28 GIS DESIGN AND IMPLEMENTATION SERVICES Croswell-Schulte provides a full range of services for GIS design and implementation support. We are active in GIS industry

More information

Detailed guidance for employers

Detailed guidance for employers April 2015 3 Detailed guidance for employers Appendix A: Pay reference periods This document accompanies: Detailed guidance no. 3 Assessing the workforce Pay reference period calendars where the definition

More information

This Conference brought to you by www.ttcus.com

This Conference brought to you by www.ttcus.com This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com U.S. Army Intelligence and Security Command Army

More information

Reliable, Repeatable, Measurable, Affordable

Reliable, Repeatable, Measurable, Affordable Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you

More information

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015 AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))

More information

Defense Acquisition Review Journal

Defense Acquisition Review Journal Defense Acquisition Review Journal 18 Image designed by Jim Elmore Joint Attack Munition Systems (JAMS) JOINT ATTACK MUNITION SYSTEMS (JAMS) PROJECT OFFICE IMPROVING SUPPORT TO THE WARFIGHTER Barry Beavers

More information

Intelligence Community Public Key Infrastructure (IC PKI)

Intelligence Community Public Key Infrastructure (IC PKI) Intelligence Community Public Key Infrastructure (IC PKI) 2002 The MITRE Corporation This technical data was produced for the U.S. Government under contract 99-G000109-000, and is subject to the Rights

More information

PERFORMANCE WORK STATEMENT (PWS) 3 Aug 15 EXECUTIVE SUMMARY FOR AFAEMS / AFVEC / AI PORTAL HELPDESK SUPPORT AIR FORCE ACQUSITION TRAINING OFFICE

PERFORMANCE WORK STATEMENT (PWS) 3 Aug 15 EXECUTIVE SUMMARY FOR AFAEMS / AFVEC / AI PORTAL HELPDESK SUPPORT AIR FORCE ACQUSITION TRAINING OFFICE PERFORMANCE WORK STATEMENT (PWS) FOR AFAEMS / AFVEC / AI PORTAL HELPDESK SUPPORT 3 Aug 15 Name: Organization: AIR FORCE ACQUSITION TRAINING OFFICE SAF/AQH-ATO Address: 555 E STREET WEST, JBSA RANDOLPH,

More information

Kyle Holmgren. Channel Account Manager IA,NE,SD,MN

Kyle Holmgren. Channel Account Manager IA,NE,SD,MN Kyle Holmgren Channel Account Manager IA,NE,SD,MN Mitel Today Mitel Today 2014 Mitel. Proprietary Mitel s Transformation 2014 Mitel. Proprietary Mitel a history of M&A 05 Aastra acquired EADS France Sep

More information

The Data Reference Model. Volume I, Version 1.0 DRM

The Data Reference Model. Volume I, Version 1.0 DRM The Data Reference Model Volume I, Version 1.0 DRM September 2004 Document Organization Document Organization 2 Executive Summary 3 Overview of the DRM 9 DRM Foundation 12 Use of the DRM 17 DRM Roadmap

More information

Core Data Service 2015 IT Domain Definition Change Overview

Core Data Service 2015 IT Domain Definition Change Overview Core Data Service 2015 IT Domain Definition Change Overview Administration and Management of IT Administration of central IT organization CIO or CTO position Institutional IT planning Financial planning

More information

PROCEDURE 1310.26 Issued: October 5, 2001 Effective Date: September 14, 2000

PROCEDURE 1310.26 Issued: October 5, 2001 Effective Date: September 14, 2000 PROCEDURE 1310.26 Issued: October 5, 2001 Effective Date: September 14, 2000 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Customer Service Center Functional Standard Executive Branch Departments and

More information

Dealing with Big Data in Cyber Intelligence

Dealing with Big Data in Cyber Intelligence Dealing with Big Data in Cyber Intelligence Greg Day Security CTO, EMEA, Symantec Session ID: HT-303 Session Classification: General Interest What will I take away from this session? What is driving big

More information

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT) Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction

More information

Office of Emergency Management Santa Monica, CA October 2014 Page 1. Public Safety Consolidation Communications Implementation Plan

Office of Emergency Management Santa Monica, CA October 2014 Page 1. Public Safety Consolidation Communications Implementation Plan Page 1 Public Safety Consolidation Communications Implementation Plan Page 2 Overview The mission of the is to protect the community of Santa Monica from the loss of life and property in the event of a

More information

DISA Testing Services for the Enterprise. Luanne Overstreet

DISA Testing Services for the Enterprise. Luanne Overstreet DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information

More information