Consolidated Afloat Networks and Enterprise Services (CANES)
|
|
|
- Jessie Allison
- 9 years ago
- Views:
Transcription
1 Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) Consolidated Afloat Networks and Enterprise Services (CANES) Statement A: Approved for public release; distribution is unlimited (OCTOBER 2015) 27 Oct 2015 CAPT William McNeal CANES Program Manager (PMW 160) Integrated Information Dominance for the 21 st Century PEOC4I.NAVY.MIL
2 PMW 160 Programs and Services We field and support C4I Tactical Networks Fleet-wide (LANs and WAN) Over 160,000 Afloat Network users Aircraft, ships and submarines Enables over 800 different applications Network Systems Consolidated Afloat Networks and Enterprise Services (CANES) Integrated Shipboard Network System (ISNS) Submarine Local Area Networks (SubLAN) Combined Enterprise Regional Information Exchange System (CENTRIXS-M) Sensitive Compartmented Information Networks (SCI Net) Patrol Coastal Network (PCNet) Maritime Operation Center Networks (MOC) Network Services & Transport Automated Digital Network System (ADNS) Operating Environment Application Integration / Early Adopters Afloat Core Services (ACS) Systems Management (SM) Fleet Introduction Team (FIT) The Navy s Tactical LAN and WAN Program Office 2
3 Status Full Deployment Decision Acquisition Decision Memorandum Secretary Kendall signed FDD ADM on 13 Oct 2015 Installations First install complete on USS McCampbell (DDG 85) in Oct ships complete (3 CVNs, 1 LHD, 2 CGs, 18 DDGs, 1 LSD) 12 installations continuing (4 CVNs, 2 LHDs, 5 DDGs, 1 LSD) Operational Testing Initial Operational Test & Evaluation (IOT&E), including cybersecurity testing, on USS Higgins (DDG 76) Operationally Effective, Suitable, and Survivable Force Level Follow On Test & Evaluation (FOT&E) on USS John C. Stennis (CVN 74) in progress Production Contract Limited deployment contract ended Dec 2014 IDIQ MAC Production contract in year 1 of 8 year period of performance CANES on USS RONALD REAGAN (CVN 76) 3
4 CANES High Level Overview Information Assurance Identification, Authentication & Access Control Configuration Protected Objects Forensics Examination Service Systems Management Malware Protection Core Enterprise Services Computing Infrastructure Transport Communications Printers (xn) Workstations (xn) /Calendar File Transfer SQL Database Office Productivity Video Distribution VoIP (xn) Servers (xn) Core Enterprise Services Wireless DNS LDAP PDA Synch Knowledge Management Domain 1 Domain 2 Domain 3 Domain 4 Encryption Service Boundary Protection 4 4
5 Tech Refresh Strategy Background Programmed to execute 2 year SW & 4 year HW baseline development cycle Significant end of life issues have potential to drive us out of cycle Change drivers Operating Environment and COTS Obsolescence Pace varying EOL and EOS timelines Support varying degrees of application portability Evolving Cybersecurity Requirements DoD and DON mandates Sales to foreign companies Task Force Cyber Awakening Corrective actions Installation Execution Requirements Shipmain requirements Fleet priorities Integration into total avail package Optimized Fleet Response Plan (OFRP) alignment CANES tech refresh cycle driven by COTS obsolescence, emerging cybersecurity requirements, and OFRP 5
6 Technology Refresh Implementation FY14 FY15 FY16 FY17 FY18 FY19 CANES Technology Refresh Strategy Ship receives latest version of CANES HW/SW Objective Baseline with EC/MOD and Release. Includes configuration updates, scheduled refresh of servers, switches, workstations and software/ operating environment. Objective Baseline 1 RELs: FAMs, Mailouts, WSUS Patches, IAVAs ECRs, Reqts Analysis, Development, TDPs, B/L and AI SITs MOD-01/SW2 RELs: FAMs, Mailouts, WSUS Patches, IAVAs ECRs, Reqts Analysis, Development, TDPs, B/L and AI SITs Objective Baseline 2 HW1/SW1 HW2/SW3 Hardware (HW) and/or Software (SW) Modification (MOD) - Changes to the CANES HW and/or SW baseline planned HW1 SW1 as necessary to address component obsolescence issues (end of life/sale/support) and software updates HW2 to current SW3 baseline. Releases (RELs) - Planned CANES system updates and fixes, implemented via Engineering Change Requests (ECRs) and packaged and released as FAMs, mailouts, WSUS Patches, or IAVAs. Addresses/includes system repairs, development fixes, CASREPs, Trouble Tickets, cybersecurity and software updates, associated procedures and media. Objective Baseline (OB) - Current as-is state of CANES. CANES OB-1 = HW1/SW1. OB-2 planned as HW2/SW3, will incorporate requirements not met in OB-1, and new stakeholder requirements. Incremental baseline changes, within scope of JROC approved CDD and IT Box plan to incorporate evolving commercial technology. 6
7 Cybersecurity and Computer Network Defense Framework Not easy, requires continuous attention as threat evolves Take holistic view vice individual vectors Must address all parts of the CND framework Protect Monitor, Analyze, and Detect Respond Capability Sustainment Vulnerability Scanning Support CND External Assessments Malware Protection Support and Training Network Security Monitoring / Intrusion Detection Attack Sensing and Warning Indications and Warnings / Situational Awareness Incident Reporting Incident Response Incident Analysis MOUs and Contracts CND Policies / Procedures CND Technology Development, Evaluation, and Implementation Subscriber Protection Support and Training Personnel Levels and Training / Certification Higher authority Direction and Implementation Information Assurance Vulnerability Management (IAVM) Security Administration CNDSP Information Systems 7
8 Industry Participation PEO C4I Gaps Document _Acq_GapsJune2014S.pdf Proposals require program endorsement for transition Tactical Cloud Enabling Capabilities Tools to support Efficient Installs Dynamic Modem to Router Interface Virtualized Networking Disruption/Delay Tolerant Networking 8
9 Where Industry Can Help Design and develop for maritime operating environment No shore tether (e.g. disconnected, intermittent, or low-bandwidth (DIL), Anti- Access/Area-Denial (A2AD) Continuous shore connectivity requirement is non-starter Apps and services need to be tolerant of latency and DIL environments Phased modernization can t get to entire Fleet in short time period Cyber Lower bandwidth patching and update processes Tools for entire computer network defense framework Speed to capability and End of Life Issues Products that facilitate quicker deployment Longer product life cycles and sustainment models that fit our environment and funding profiles Applications and services that are operating system agnostic or facilitate rapid changes in OSs Space, Weight, and Power (SWaP) Denser computing with lower SWaP requirements Looking for the best industry has to offer 9
10 PMW 160 Contract Opportunities Description Enterprise Engineering and Cyber Services Enterprise Program Mgmt / Acquisition / Financial / Contract / Admin Services ADNS Inc III Production Enterprise Integrated Logistics Support (ILS) Services Anticipated Award 3 rd Qtr FY16 1 st Qtr FY 17 4th Qtr FY17 1st Qtr FY18 SPAWAR has posted an updated three-year acquisition forecast to its public web portal entitled "SPAWAR 3 Year Acquisition Forecast" below. This forecast includes opportunities for SPAWAR Headquarters, SPAWAR System Centers Atlantic and Pacific. The forecast is informational only and does not constitute an offer or commitment by the Navy to fund, in whole or part, the opportunities herein. Vendors shall not contact any contracting or technical personnel regarding this information and all inquires shall be submitted via to [email protected] 10
PEO C4I & PEO Space Systems Overview
PEOC4I.NAVY.MIL Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) PEO C4I & PEO Space Systems Overview 29 Jan 2013 RDML Jerry Burroughs PEO C4I PEO Space Systems
Consolidated Afloat Networks and Enterprise Services (CANES)
Consolidated Afloat Networks and Enterprise Services (CANES) Re-architecting the Navy s s C4I Network Infrastructure Lockheed Martin SNA Media Brief 11 January 2010 Lockheed Martin Proprietary Information
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Technical Framework for Cloud Computing at the Tactical Edge
Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) Technical Framework for Cloud Computing at the Tactical Edge STATEMENT A: : Approved for public release,
Encl: (1) Surface Warfare Tactical Requirement Group Membership
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 5420.113 N9 OPNAV INSTRUCTION 5420.113 From: Chief of Naval Operations Subj: SURFACE
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
Managed Services. Business Intelligence Solutions
Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services
Space and Naval Warfare Systems Center Atlantic
Space and Naval Warfare Systems Center Atlantic Small Business and Industry Outreach Initiative (SBIOI) Twenty-Seventh Quarterly Symposium 31 January 2013 Mr. Charles Adams Transport & Computing Infrastructure
How To Develop A Data Center Cost Model
Considerations in Data Center Migration Life Cycle Cost Estimating A Joint Information Environment (JIE) Perspective Dennis J. McKeon June 2015 Approved for Public Release; Distribution Unlimited 15-1446.
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off
Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off Times have Changed & A/V Executives Agree An A/V product as your sole endpoint protection solution isn t enough.
Space and Naval Warfare Systems Center Atlantic
Space and Naval Warfare Systems Center Atlantic Charleston Defense Contractors Association 40 th Small Business Industry Outreach Initiative 23 June 2016 Mr. Chris Miller SSC Atlantic Executive Director
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Federal Aviation Administration
Federal Aviation Administration Current Contract Security Capabilities Prepared by: FAA Telecommunications Infrastructure (FTI)-2 Program Office, AJM-3170 Date: October 5, 2015 1 Table of Contents 1.0
Cyber R &D Research Roundtable
Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes
CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67H CH-63
CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67H CH-63 Updated: July 2015 TABLE OF CONTENTS INFORMATION SYSTEMS TECHNICIAN SUBMARINES (ITS) SCOPE OF RATING GENERAL INFORMATION INFORMATION
White Paper: Consensus Audit Guidelines and Symantec RAS
Addressing the Consensus Audit Guidelines (CAG) with the Symantec Risk Automation Suite (RAS) White Paper: Consensus Audit Guidelines and Symantec RAS Addressing the Consensus Audit Guidelines (CAG) with
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
Defense Daily Open Architecture Summit 2014 PEO IWS Open Architecture Implementation
Defense Daily Open Architecture Summit 2014 PEO IWS Open Architecture Implementation Mr. Bill Bray, Executive Director Program Executive Office, Integrated Warfare Systems November 4, 2014 DISTRIBUTION
Information Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives Center of excellence for secure integration, deployment and sustainment of Industrial Control Systems and Operational Technology
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
United States Department of Agriculture Marketing and Regulatory Programs Grain Inspection, Packers and Stockyards Administration Directive GIPSA 3140.5 11/30/06 WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
ONR/PEO IWS/PEO C4I Combat System (CS)/Command and Control (C2) Limited Test Experiment (LTE) and Results: A SOA Success Story
ONR/PEO IWS/PEO C4I Combat System (CS)/Command and Control (C2) Limited Test Experiment (LTE) and Results: A SOA Success Story Matthew Fisher Progeny Systems March 31st, 2011 Part Number: P005578, Rev:
DoD Application Store: Enabling C2 Agility?
DoD Application Store: Enabling C2 Agility? 19 th International Command and Control Research Symposium C2 Agility: Lessons Learned from Research and Operations Track: 3 resenters: Mr. Michael Morris and
The Information Technology Program Manager s Dilemma
The Information Technology Program Manager s Dilemma Rapidly Evolving Technology and Stagnant Processes Kathy Peake 26 Since inception, the Department of Defense s development of acquisition policies and
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
Accenture Cyber Security Transformation. October 2015
Accenture Cyber Security Transformation October 2015 Today s Presenter Antti Ropponen, Nordic Cyber Defense Domain Lead Accenture Nordics Antti is a leading consultant in Accenture's security consulting
CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67F CH-48
CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67F CH-48 Updated: October 2011 TABLE OF CONTENTS INFORMATION SYSTEMS TECHNICIAN (IT) SCOPE OF RATING GENERAL INFORMATION INFORMATION TECHNOLOGY
Enterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT
How Microsoft runs IT Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT 2 Source: Accenture Cloudrise: Rewards & Risks at the Dawn of Cloud Computing, November 2010 3 Source: Accenture Cloudrise:
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
National Initiative for Cybersecurity Education
THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital
CYBER CENTER OF EXCELLENCE:
CYBER CENTER OF EXCELLENCE: STRENGTHENING CRITICAL INFRASTRUCTURE October 27, 2014 Statement A: Approved for public release, distribution is unlimited (27 OCTOBER 2014) Agenda 1300 Pat Sullivan, Executive
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Defending against modern cyber threats
Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com
Intelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
DISA Acquisition Opportunities
DISA Acquisition Opportunities 2014 Forecast to Industry 1 CAE Acquisition Opportunities GCCS-J Program support Base year and one 1 year option with total estimated value of $5M Current PoP ends 28 Nov
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
2015 Defense Health Information Technology Symposium. Operations and Sustainment Services Supporting the Medical Enterprise
Mr. Wayne Speaks Mr. Bill Novak 2015 Defense Health Information Technology Symposium Operations and Sustainment Services Supporting the Medical Enterprise Medically Ready Force Ready Medical Force DHA
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
CYBER SECURITY WORKFORCE
Department of the Navy CYBER SECURITY WORKFORCE SCHEDULE A HIRING AUTHORITY FINAL IMPLEMENTING GUIDANCE Prepared by: DONCIO USMC SPAWAR NAVY CYBER FORCES FFC OCHR HRO HRSC 1 Table of Contents I. Introduction
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Space and Naval Warfare Systems Center Atlantic
Space and Naval Warfare Systems Center Atlantic Business and Force Support Portfolio Industry Opportunities SSC Atlantic Small Business and Industry Outreach Initiative Gulf Coast Government Contractor
Cybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
Facilitated Self-Evaluation v1.0
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
G2 Industry Day 2015 29 JULY 2015. Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE
G2 Industry Day 2015 29 JULY 2015 Mr. Stephen Kreider PEO IEW&S 1 PEO IEW&S Organization 2 PEO IEW&S Snap-Shot Overview Army Chartered Program Executive Officer responsible for management of assigned programs
The State of DoD Biometrics
The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E [email protected] 1 Agenda What We ve Done Biometrics
23.9.2015. Kangas Cybersecurity strategy
Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures
KUDELSKI SECURITY DEFENSE. www.kudelskisecurity.com
KUDELSKI SECURITY DEFENSE Cyber Defense Center connection for remote information exchange with local monitoring consoles Satellite link Secure Data Sharing, a data-centric solution protecting documents
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR
Best Practices for Consolidation Projects
Best Practices for Consolidation Projects Lynne Glickman Solution Architect Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
A Comprehensive Cyber Compliance Model for Tactical Systems
A Comprehensive Cyber Compliance Model for Tactical Systems Author Mark S. Edwards, CISSP/MSEE/MCSE Table of Contents July 28, 2015 Meeting Army cyber security goals with an IA advocate that supports tactical
Since 2005 E-SPIN SDN BHD. All Right Reserved. www.e-spincorp.com. SIEM - Log Consolidation Management (LCM) Solution
Since 2005 E-SPIN SDN BHD. All Right Reserved. www.e-spincorp.com SIEM - Log Consolidation Management (LCM) Solution Copyrighted Copyright Since 2005-2011 and respective update by E-SPIN Sdn. Bhd. All
Information Assurance Workforce (IAWF) Contracting Officer Representative (COR) & Project Manager (PM) Workshop
Information Assurance Workforce (IAWF) Contracting Officer Representative (COR) & Project Manager (PM) Workshop Shannon Lawson Command IAM SSC Pacific Distribution Statement A. Approved for Public Release;
Customized Cloud Solution
Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel
ARF, ARCAT, and Summary Results Lt Col Joseph L. Wolfkiel Enterprise-Level Assessment and Reporting The Concept Assessment Results Format (ARF) Assessment Summary Results (ASR) The Assessment Results Consumer
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide
METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide Contents Introduction...2 Coalition and extranet collaboration... 3 Deploying military units... 4 Fob-rob collaboration...4
NASCIO 2015 State IT Recognition Awards
NASCIO 2015 State IT Recognition Awards Title: State of Georgia Private Security Cloud Implementation Category: Cybersecurity Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA [email protected]
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense John M. Gilligan Information systems Security Association National Capital Chapter January 19, 2010 1 Topics Background
Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:
Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described
VA Medical Device Protection Program (MDPP)
VA Medical Device Protection Program (MDPP) Presented to National Institute for Standards and Technology (NIST) Health Security Conference May 11, 2011 Table of Contents Introduction MDPP Timeline and
Remote Network Monitoring Software for Managed Services Providers
http://www.packettrap.com Remote Network Monitoring Software for Managed Services Providers PacketTrap MSP provides a cost-effective way for you to offer enterprise-class server, application, and network
PacketTrap One Resource for Managed Services
Remote Monitoring Software for Managed Services Providers PacketTrap RMM provides a cost-effective way for you to offer enterprise-class server, application, and network management to your customers. It
Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking
ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...
Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat
Addressing the blind spots in your security strategy BT, Venafi & Blue Coat Agenda Welcome & Introductions Phil Rodrigues, Director of Security Architecture, Asia Pacific, BT A blueprint for the perfect
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski
IT AUDIT Current Trends and Top Risks of 2015 2 02 Eric Vyverberg WHO WE ARE David Kupinski Randy Armknecht Associate Director Internal Audit Protiviti 317.510.4661 [email protected] Managing
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
