continue to have difficulty with communications in the Arctic region.
|
|
- Kelley Russell
- 8 years ago
- Views:
Transcription
1 How do you see the role & importance of satellite communications in the fulfillment of the CG mission? SATCOM has been critical to timely and reliable communications in the maritime environment. Its role is likely to continue to grow. Are there specific communication requirements that are currently not being met? We continue to have difficulty with communications in the Arctic region. Who, within the CG should industry talk to about satellite communications & new capabilities & technologies? CG-761 is the Coast Guard s Command, Control and Communications sponsor. What is holding up the decision process of determining acts of war response to cyberattacks? This is not a question the USCG can answer. National Policy or Defense Related issues should be addressed to other parts of the government. Working in an environment of limited resources, what are the CG s top programs regarding funding? Within the CG Intelligence enterprise Information Technology is our top (by dollars assigned) program, with 37.6% of our O&M dollars; Technical Intelligence is second with 22.4% of our O&M funds. What programs, if any, are being impacted due to funding constraints? Within the CG Intelligence enterprise, our overall management and support staffing has been cut significantly over the past few fiscal years. Can you please provide more information on what you mean by counterintelligence within the acquisition process? CI support to RDA programs focuses on protecting critical technologies, and critical components; those technologies and functions deemed critical to the operational viability of the RDA program. CI support is from cradle to grave; it educates RDA personnel about the threats and collection methodologies directed against RDA programs and the supply chain, as well as how to detect and respond to foreign collection activity. Private industry often has broad capabilities and the ability to quickly adapt to the needs of most customers. Can you provide 2-3 specific ways that private industry partners can expect to support the efforts of CG intelligence either through people with specific skills or IT platforms? Contractors with skill sets in emerging intelligence capabilities would be in the best position to benefit (Cyber, IT, others) How do you see the role & importance of satellite communications in the fulfillment of the CG mission? SATCOM has been critical to timely and reliable communications in the maritime environment. Its role is likely to continue to grow. Are there specific communication requirements that are currently not being met? We continue to have difficulty with communications in the Arctic region.
2 Who, within the CG should industry talk to about satellite communications & new capabilities & technologies? CG-761 is the Coast Guard s Command, Control and Communications sponsor. What is holding up the decision process of determining acts of war response to cyberattacks? This is not a question the USCG can answer. National Policy or Defense Related issues should be addressed to other parts of the government. Has there been any consideration given to making use of more flexible/agile contracts? For example, to support specific missions, award contracts for 3-6 months to support specific tasks instead of awarding contracts for the traditional base and multiple option years. CG-28 supports the idea of shorter-term or flexible contracts. We have done level-ofeffort contracts which request a certain number of work hours within a specified calendar period (usually a year). Our Acquisition folks have tended to award annual contracts with option years simply to standardize things and make them more repeatable. Does the CG maintain a network infrastructure evaluation and test organization to validate systems capabilities before deployment? Since most systems utilized by CG are existing Navy or DoD Program of Record systems independent testing by CG isn t necessary. However, for new and unique systems CG does have the capability. Who is responsible for evaluation of firewalls, IPS/IDS? Is this a part of network infrastructure or a separate IA group? CG engineering staff would initially be responsible for network components, although validation is conducted by a separate IA organization. When will the CG undertake tech refresh on both afloat & ashore IT systems? It really depends on the system. Can CG use other DHS task orders or contracts & transfer funds to these task orders? The CG can and does use task orders on DHS contracts. We also often transfer funds to the Office of Selective Acquisitions for use on sensitive contracts. With the CG being the backside for homeland security in the maritime, will the OPC have the C4ISR to be able to work seamlessly in support of USN? The OPC will typically conduct its primary missions in the Coast Guard deepwater environment, beyond 12 nautical miles from shore, and will be deployed anywhere around the globe where the national interests require the Coast Guard s unique blend of authorities and capabilities. It will include a sophisticated C4ISR suite of sensors, displays, and communications equipment and will be equipped with combat weapons systems scaled to the expected threat environments. To maximize efficiency, the OPC will be interoperable with the USN and have the ability to exchange voice, data and video with DoD, DHS components, international partners, commercial and private vessels or aircraft.
3 You mention that workforce within the CIO organization requires more professional personnel; both enlisted & officers this also appears to be the case with the new assets (aircraft & NSCs) when will the personnel system catch up with policies such as assignments and pro-pay? The personnel system is working well; it is the resourcing system that is playing catch up. We have brought on capabilities and acquisitions without adequately resourcing them due to reduced budget. CG-DoD Industry technology sharing Can we do better so we don t pay more than once with a limited budget? For example, Navy systems may be overkill for CG application, can we do systems scalable to fit multiple services. Can CG define requirements more effectively? Yes, absolutely. There is always room for improvement when it comes to defining requirements & technology sharing. We have been working closely with N2N6 on this very issue specific to cryptologic systems. The current environment is ripe across C4ISR for finding cost-efficient ways to address various requirements via scalable systems. RDT&E funding streams across government, likewise, increasingly requires joint capability/meeting joint requirements in the earliest stages of the funding request process to gain any traction for support. Is the intel IT budget separate from the CG Non-intel budget? How much funding does the CG get from ODNI for your intel IT budget? Coast Guard Intelligence receives funding from both the IC and as part of its regular DHS appropriation. IT purchases are made with both sources of funds. The exact amounts of the IC funding as classified. IT program purchases consume 37.6% of our available O&M funds. Working in an environment of limited resources, what are the CG s top programs regarding funding? Within the CG Intelligence enterprise Information Technology is our top (by dollars assigned) program, with 37.6% of our O&M dollars; Technical Intelligence is second with 22.4% of our O&M funds. What programs, if any, are being impacted due to funding constraints? Within the CG Intelligence enterprise, our overall management and support staffing has been cut significantly over the past few fiscal years. Can you please provide more information on what you mean by counterintelligence within the acquisition process? CI support to RDA programs focuses on protecting critical technologies, and critical components; those technologies and functions deemed critical to the operational viability of the RDA program. CI support is from cradle to grave; it educates RDA personnel about the threats and collection methodologies
4 directed against RDA programs and the supply chain, as well as how to detect and respond to foreign collection activity. Will the CG follow the USN Information Dominance Corps model, i.e. integrating N2&N6 by integrating CG-2 & CG-6? At the Headquarters staff level, the Coast Guard will not be integrating our CG2 and CG6 staff. However, to support computer network defense, Protection of the Maritime Critical Infrastructure and Providing a Decision Advantage in Maritime Operations with Cyber Capabilities, moving operational function of CG-2 and CG-6 that currently occur in the policy and engineering staffs and placing them under a unified command at the operational layer of mission is being reviewed and expected to occur. C4ISR as capital program: USCYBERCOM (General Alexander) previously convinced the Joint Chiefs of Staff that transitioning existing C4ISR systems to Cloud- Computing architecture (JIE) will save some long term DoD funding while increasing cybersecurity posture. Will DHS & by extension the CG transition C4ISR systems to a similar cloud computing architecture? DHS is currently moving to Technology As A Service cloud architecture. For example Workplace As A Service, Share point As A Service, etc. The USCG is a military organization that is fully tied to the.mil networks. Additionally, in our operating environment, we rely on DOD sensors, information systems and training systems at all classification levels to provide our Intelligence Surveillance and Reconnaissance (ISR) needs in the Maritime. As such, we will be moving with DOD to the JIE Architecture. However, as a DHS component, there are likely elements of the As A Service solutions that the Coast Guard may use to ensure our reporting and information sharing with our department is firmly in place. How important is encryption for CG s cyber security? Encryption of our communication within our.mil network and when transiting between Other Government agencies at the Federal, State, Local, Territorial and Tribal levels is critical to Operational Security. Establishing a robust encryption capability, which minimizes our workforce remembering to encrypt data transmitted to other government entities, will significantly reduce our Privacy and Operational Security Information Spills. What is the CG doing to ensure the networks on its cutters are cyber secured- from both internal & external threats? The Coast Guard's Information Assurance programs for shipboard systems are certified and accredited using the same process as our shore side equipment. CG-65 is responsible for Unclassified and GENSER Classified, while CG-26 is responsible for SCI systems. Performing security updates to our electronics and computer systems on our cutters are the responsibility of our Base C4IT Divisions. They work with CGCYBER and the respective systems Product Line Manager within the C4ITSC and the Intelligence Coordination Center to ensure software updates/patches that can be deployed from a central site are correctly loaded and audit logs of those systems
5 are reviewed for threats. When central deployments cannot be performed, the Base C4IT Division coordinates the local installation. Shipboard systems that are on the network are monitored by our CGCYBER Security Operations Center (CSOC). When a security alert is triggered our Information Systems Security Officers at the Base C4IT Divisions coordinate with ship personnel to contain and when necessary eradicate the threat. What role can/should SIGINT play in Cyber? SIGINT provides a vital window for our nation into foreign adversaries' capabilities, actions, and intentions. This includes the ability to see the cyber battle space and gain insights into the opponent s use of cyber to inform cyber operations. It is precisely what led the joint world to align US Cyber Command with the SIGINT situational awareness and knowledge of the battlespace of NSA. How does the CG define Cyber? Where does the CG draw the boundaries of intersection between cyber & operations & cyber & policy? The Coast Guard is currently drafting these definitions for our CG Cyber Strategy and internal alignment of resources as discussed in question #20 above. What is the most significant challenge facing USCG Cyber Command in working with US Cyber Command & DHS NPPD Cyber Office? The Coast Guard must establish a single Cyber Watch Center that provide cyber situational awareness for the Maritime Domain. This means that all Computer Network Defense, Maritime Critical Infrastructure and Decision Advantage cyber activities across the electromagnetic spectrum must go through this center so that DHS NCCIC and DOD s USCYBERCOM watch centers. It seems as though most of the CG representation today is from the operational or HQ policy side of the CG. Could you please discuss the portals available to industry to engage with your acquisition directorate? Do they handle acquisition for CG SIGINT/Intel Programs? Certainly, we hear loud & clear that you d like more Acquisition (CG-9) representation at the next CG Intelligence Industry Day and we will work to get them involved. Regarding acquisitions of SIGINT equipment; the answer is it depends. Equipment that is part of the National Security Cutter was part of the construction contract, so CG-9 had a hand in acquiring that. Follow-on support and maintenance for that equipment may go through CG-9, or if the Statement of Work is sensitive, we may work through the DHS Office of Selective Acquisitions. What is holding up the United States from joining the international Arctic consortium group? Without more information, we are unfortunately unable to answer this question.
6 After extensive research and coordination, neither the Coast Guard (DCO-X and other offices with whom we work) nor our interagency partners has heard of the international Arctic consortium group or any other organization with a similar name. If the person posing this question could provide more details as to the actual name of this consortium or group, we could provide a more comprehensive answer. Of course, the primary international body dealing with the Arctic is the Arctic Council, consisting of the eight Arctic nations, various indigenous groups, non-governmental organizations, and an increasing number of permanent observer States. The United States has been a key member since the Ottawa Declaration in The United States has not joined the 1982 UN Convention on the Law of the Sea, which provides the governing principles for world's ocean and coastal waters, including the Arctic maritime regime. However, since President Reagan's ocean policy statement of March 1983, the United States has committed itself to following the non-seabed mining provisions of the Convention. Moreover, the United States signed the Ilulissat Declaration in May 2008, along with the four other States bordering the Arctic Ocean: Canada, Denmark (Greenland), Norway, and the Russian Federation. Among other things, that Declaration recognizes that "the law of the sea provides for important rights and obligations concerning the delineation of the outer limits of the continental shelf, the protection of the marine environment, including ice-covered areas, freedom of navigation, marine scientific research, and other uses of the sea. We remain committed to this legal framework and to the orderly settlement of any possible overlapping claims." The United States is also committed to the development of an Arctic Coast Guard Forum, mandatory rules to promote safe maritime activities in the Arctic under the auspices of the International Maritime Organization, and bilateral and multilateral agreements governing search and rescue, oil spill prevention and response, safety of vessels and aircraft operating in the Arctic, environmental protection, maritime boundary delimitation, marine scientific research, food security and cultural protection for the indigenous peoples of the Arctic, sustainable development, and other topics. Please describe the CG s approach to engaging small business, including its SB goals, progress toward meeting these goals and use of small business set asides. The Coast Guard realizes that small businesses are a vital part of our national strength. We are proud of our record for awarding Coast Guard contracts to small businesses and our record for meeting or exceeding annual socioeconomic goals. In 2013, the Coast Guard awarded nearly 34% of its procurement dollars to small businesses and exceeded agency goals for awards to Small Business, Small Disadvantaged Business, (8a) Small Disadvantaged Business, HUBZone contracts, and Service Disabled Veteran Owned Small Business. The Coast Guard awards contracts via Small Business Set-asides when market research indicates that the market meets the "rule of two" and via other competitive and limited
7 competition processes. The Coast Guard announces upcoming opportunities via the Acquisition Planning Forecast System. Each of the Coast Guard's six acquisition centers has a Small Business Specialist charged with engaging small businesses for market research, facilitating their participation in appropriate procurements, and answering procedural questions to enhance understanding of the procurement process. Moreover, the Coast Guard has a Small Business Specialist/Industry Liaison who oversees the Coast Guard's small business program. The Coast Guard s Head of the Contracting Activity closely monitors progress against annual small business and other socioeconomic goals and is a strong advocate of the small business program. For additional information about Coast Guard small business programs and points of contact, please visit the following website: CG becoming a model acquisition community is the CG establishing a civilian professional acquisition community commensurate with the USN civilian professional acquisition community, i.e. DAWIA certification? Yes, the U. S. Coast Guard (USCG) Acquisition Directorate s Human Capital Strategic Plan (HCSP) maps out a vision and direction for maintaining and continually developing a world-class acquisition workforce. The HCSP outlines current challenges, details strategies for addressing those challenges, and identifies specific courses of action to ensure that we have skilled and certified professionals available to perform the USCG s acquisition functions now and in the future. Both the USCG and Defense Acquisition Workforce Improvement Act (DAWIA) acquisition workforce share a community of practice and many similar characteristics. The USCG acquisition certification process is structured in alignment with the Department of Homeland Security (DHS) and closely mirrors DAWIA. Both DHS and DAWIA use certifications to determine that an employee meets the education, training, and experience standards required for a particular career field. USCG personnel can obtain certification in the following acquisition career fields through DHS: Contracting, Cost Estimating, Life Cycle Logistics, Program Financial Management, Program Manager, Systems Engineering, and Test and Evaluation. The Coast Guard uses DAWIA requirements for those career fields where no DHS certification exists: Facilities Engineering, Information Technology, Production, Quality and Manufacturing, and Requirements Management. Both DHS and DAWIA have a three tier competency level certification system (entry level I, mid level II, and senior level III) with requirements that have many common characteristics:
8 Training: To satisfy competencies through training, there are requisite hours and subjects that must be included in the curriculum. Some DHS and all Coast Guard certification training requirements can be met through the completion of Defense Acquisition University (DAU) courses. DAU courses, when specific DHS courses are not available, provide a common training resource. Experience: In general, the entry level requires a minimum of one year of relevant experience. The mid level and senior level certifications require two and four years of experience, respectively. Fulfillment: A common process of using experience, education, professional certification, or training to satisfy competency requirements. To accomplish the eye to eye contact you would like, what can industry and CG ops do to navigate the turbulent waters of the federal contracting offices? Quality Industry Engagement is a priority for the DHS Chief Procurement Officer and for the Coast Guard Head of Contracting Activity. The Coast Guard is proactively leaning forward to improve "eye to eye" contact to improve market research, refine requirements, and enhance competition, while maintaining a level playing field during procurements. Coast Guard customers should engage their cognizant contracting staff early to maximize the opportunities for industry engagement. In addition to standard vehicles, such as Requests for Information (RFI), contracting officers can organize capability presentations, one-onone meetings, and other meaningful, mutually productive sessions. The Coast Guard is planning multiple Industry Days across the contracting enterprise in the coming months; industry partners should actively participate in such events. Early planning and adherence to a few basic rules permits all parties to navigate the waters...it need not be turbulent! Please address your acquisition capabilities & trends. Basically, describe how you buy. Under the leadership of the Head of the Contracting Activity, Coast Guard procurements are executed by six Chiefs of Contracting and over 500 civilian and military members. Coast Guard acquisition professionals are certified, highly trained and motivated to maximize taxpayer value. The portfolio of supplies, services and major systems the Coast Guard acquires is broad, and it requires creativity and flexibility. The Coast Guard utilizes a broad array of procurement types, from purchase cards to formal source selection, to meet its operational needs and to support component and Departmental goals for competition, socioeconomic programs and other targets. In 2013, the Coast Guard obligated nearly 57 percent of its award dollars competitively and nearly 34 percent of its dollars to Small Businesses, while exceeding targets for awards to Small Disadvantaged Businesses, HUBZone awards and Service Disabled
9 Veteran Owned Small Businesses. The Coast Guard will continue to recapitalize its fleet and meet operational requirements via competitive procurements to the maximum extent practicable. The Coast Guard will also continue to focus on improved industry engagement and quality procurement planning via the Acquisition Planning Forecast System. Additionally, the Coast Guard will continue to provide timely feedback on contractor performance and utilize such information when conducting source selections to ensure that precious procurement funds are awarded to high performing companies.
To the Men and Women of the Coast Guard:
United States Coast Guard Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance & Information Technology (C4ISR&IT) Strategic Plan Fiscal Years 2015-2019 To the Men and
More informationCoast Guard Top Acquisition Priorities and the Interoperability Imperative
Coast Guard Top Acquisition Priorities and the Interoperability Imperative CG 9 Capt Joe Vojvodich, C4ISR Acquisition Program Mgr ComDef West 2010 01 February 2010 Advancing Force Multiplicity Coast Guard
More informationDEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION
DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN 2015 2020 UNITED IN SERVICE TO OUR NATION DIRECTOR S STATEMENT We are at an operational crossroads. We continue to operate in a contested battlespace,
More informationCOMMAND, CONTROL, COMMUNICATIONS, COMPUTERS AND INFORMATION TECHNOLOGY (C4&IT) INFRASTRUCTURE MANAGEMENT POLICY
Commandant United States Coast Guard 2100 Second Street, S.W. Washington, DC 20593-0001 Staff Symbol: CG-6 Phone: (202) 267-2767 Fax: (202) 267-2598 COMDTINST 5230.70 FEB 11 2005 COMMANDANT INSTRUCTION
More informationCYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationCANADA AND THE NORTH INSUFFICIENT SECURITY RESOURCES THEN AND NOW
CANADA AND THE NORTH INSUFFICIENT SECURITY RESOURCES THEN AND NOW Prepared by: Colonel (Retired) Pierre Leblanc 9 August 2011 BACKGROUND In the late 1990 s I was the Commander of the Canadian Forces in
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
More informationSTATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
More informationIntelligence Officer Career Guide
UNITED STATES COAST GUARD Intelligence Officer Career Guide Active Duty LTJG CAPT Table of Contents The General Development of an Officer... 3 Building the Intelligence Officer... 3 1. Training... 4 2.
More informationThe Nationwide Automatic Identification System Newsletter Issue #1 3 rd Quarter FY 2007
June 2007 Issue 1 The Nationwide Automatic Identification System Newsletter Issue #1 3 rd Quarter FY 2007 W elcome to the first issue of The Guardian, a quarterly newsletter issued by the Nationwide Automatic
More informationEnterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength
Enterprise IT Aligning Strong Solutions, Assuring Enterprise Strength Strategic planning aligns your enterprise IT infrastructure with your mission, operational and efficiency goals. From the start, we
More informationRapid Response, Total Support. Homeland Security Solutions that Keep America Safe
Rapid Response, Total Support Homeland Security Solutions that Keep America Safe Solutions on the Front Lines of Homeland Security For the homeland security community, there are no second chances. Critical
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
More informationSeptember 24, 2015. Mr. Hogan and Ms. Newton:
Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930
More informationThe Guidelines for U.S.-Japan Defense Cooperation April 27, 2015
The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015 I. Defense Cooperation and the Aim of the Guidelines In order to ensure Japan s peace and security under any circumstances, from peacetime
More informationDepartment of Homeland Security Office of Inspector General
Department of Homeland Security Office of Inspector General Coast Guard Has Taken Steps To Strengthen Information Technology Management, but Challenges Remain OIG-11-108 September 2011 Office of Inspector
More informationFlexible, Life-Cycle Support for Unique Mission Requirements
Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics
More informationDepartment of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)
Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) References: See Enclosure
More informationForecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
More informationNAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN 2013-2018 2 NAVAL SEA SYSTEMS COMMAND Foreword Everything the United States Navy brings to the fight, and ultimately does for the nation, is delivered
More informationUnited States Coast Guard Cyber Command. Achieving Cyber Security Together. Homeland Security
United States Coast Guard Cyber Command Achieving Cyber Together Brett Rouzer Chief of MCIKR Protection U.S. Coast Guard Cyber Command DHS NCCIC Liaison Officer (202) 372-3113 Brett.R.Rouzer@uscg.mil Vision
More informationNetwork Systems Integration
Network Systems Integration Strong Networks for Mission-Critical Services Turnkey Solutions for Today s Large-Scale Networks Government and business enterprises turn to General Dynamics Information Technology
More informationD E PAR TME NT OF THE NAVY OFFICE OF THE SECR ET A R Y 1000 N A VY PENT A G ON W A SHI N G T ON D C 20350-1000
D E PAR TME NT OF THE NAVY OFFICE OF THE SECR ET A R Y 1000 N A VY PENT A G ON W A SHI N G T ON D C 20350-1000 SECNAVINST 5430.27D OJAG (Code 13) SECNAV INSTRUCTION 5430.27D From: Secretary of the Navy
More informationDEPARTMENT OF HOMELAND SECURITY
DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $43.2 billion, an increase of $309 million above the 2010 enacted level. Increases were made in core homeland security functions such as border
More informationMarine Corps. Commercial Mobile Device Strategy
Marine Corps Commercial Mobile Device Strategy April 2013 THIS PAGE INTENTIONALLY LEFT BLANK FOREWORD The currently constrained budget environment requires us to balance fiscal responsibility and mission
More informationStatement of. Vice Admiral William A. Brown, United States Navy. Deputy Commander, United States Transportation Command
Statement of Vice Admiral William A. Brown, United States Navy Deputy Commander, United States Transportation Command Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces
More informationCompTIA and the State of Federal Information Security
The Computing Technology Industry Association The State of Federal Information Security Committee on Oversight and Government Reform Subcommittee on Government Management, Organization, and Procurement
More informationInternational cooperation in defense acquisition programs is an important but complex undertaking.
H U M A N C A P I T A L I N I T I A T I V E S New Career Path Recognizes Global Scope of Acquisitions International Acquisition Career Path Duane Tripp Roy Wood International cooperation in defense acquisition
More informationHow SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR
More information(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
More informationLaw on Coast Guard. Art 1 Purpose. The purpose of this law is to reestablish a Coast Guard for Somalia. Art 2 Definitions
Law No------/2015 Law on Coast Guard Art 1 Purpose The purpose of this law is to reestablish a Coast Guard for Somalia. For the purpose of this Law:. means. Art 2 Definitions Art 3 Applicability of Somali
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5144.02 November 21, 2014 DCMO SUBJECT: DoD Chief Information Officer (DoD CIO) References: See Enclosure 1. PURPOSE. Under the authority vested in the Secretary
More informationThis directive establishes the Department of Homeland Security (DHS) Security Education, Training, and Awareness (SETA) Program.
Department of Homeland Security Management Directive System MD Number: 11053 Issue Date: 10/12/2004 SECURITY EDUCATION, TRAINING, AND AWARENESS PROGRAM DIRECTIVE 1. Purpose This directive establishes the
More informationU.S. Coast Guard Command, Control, Communication, Computers, Intelligence, Surveillance, and Reconnaissance Modernization
U.S. Coast Guard Command, Control, Communication, Computers, Intelligence, Surveillance, and Reconnaissance Modernization October 28, 2014 OIG-15-05 HIGHLIGHTS U.S. Coast Guard Command, Control, Communication,
More informationGAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3115.10E March 24, 2006 USD(I) SUBJECT: Intelligence Support to Personnel Recovery References: (a) Title 10, United States Code (b) Title 50, United States Code
More informationDEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000
DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 5000 Ser NOO / )00063 21 May 10 MEMORANDUM FOR DISTRIBUTION From: Subj: Ref: Encl: Chief of Naval Operations
More informationReliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
More informationAPPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
More informationDEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 9410.5C N2/N6 OPNAV INSTRUCTION 9410.5C From: Chief of Naval Operations Subj: NAVY
More informationEmergency Support Function #9 Search and Rescue Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:
ESF Coordinator: Homeland Security/ Federal Emergency Management Agency Primary Agencies: Homeland Security/ Federal Emergency Management Agency Homeland Security/ U.S. Coast Guard the Interior/National
More informationBEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT
BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT Northrop Grumman Corporation Trusted, Innovative, World-Class Supply Chain INTERVIEWS Kevin Engfer Director, Supplier Mission Assurance, Northrop Grumman
More informationFinal reports on deepened defence cooperation between Finland and Sweden
Final reports on deepened defence cooperation between Finland and Sweden Report by the Finnish Defence Forces and the Swedish Armed Forces 1 Background In this joint final report the Finnish Defence Forces
More informationOPNAVINST 3000.15A USFF/CNO N3/N5 10 Nov 2014
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3000.15A USFF/CNO N3/N5 OPNAV INSTRUCTION 3000.15A From: Chief of Naval Operations
More informationHOMELAND SECURITY ACQUISITIONS
United States Government Accountability Office Report to Congressional Requesters April 2015 HOMELAND SECURITY ACQUISITIONS Major Program Assessments Reveal Actions Needed to Improve Accountability GAO-15-171SP
More informationU.S. Coast Guard. America s Maritime Guardian
U.S. Coast Guard America s Maritime Guardian Nov. 2009 A few armed vessels, judiciously stationed at the entrances of our ports, might at a small expense be made useful sentinels of the laws. Alexander
More informationGAO MILITARY EDUCATION. Improved Oversight and Management Needed for DOD s Fellowship and Training-with-Industry Programs
GAO United States Government Accountability Office Report to Congressional Committees April 2012 MILITARY EDUCATION Improved Oversight and Management Needed for DOD s Fellowship and Training-with-Industry
More informationThe U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter
The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter 1. In what ways do private entities currently share with, and receive from, the government cyber threat information?
More informationPreventing and Defending Against Cyber Attacks October 2011
Preventing and Defending Against Cyber Attacks October 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their
More informationSubj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING
SECNAV INSTRUCTION 1543.2 From: Secretary of the Navy SECNAVINST 1543.2 DON CIO Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING Ref: See Enclosure (1) Encl: (1) References (2) Responsibilities
More informationDepartment of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process
Department of Homeland Security Office of Inspector General Review of U.S. Coast Guard Enterprise Architecture Implementation Process OIG-09-93 July 2009 Contents/Abbreviations Executive Summary...1 Background...2
More informationDOD BUSINESS SYSTEMS MODERNIZATION. Additional Action Needed to Achieve Intended Outcomes
United States Government Accountability Office Report to Congressional Committees July 2015 DOD BUSINESS SYSTEMS MODERNIZATION Additional Action Needed to Achieve Intended Outcomes GAO-15-627 July 2015
More informationDepartment of Defense DIRECTIVE. SUBJECT: The National Security Agency and the Central Security Service
Department of Defense DIRECTIVE NUMBER 5100.20 December 23, 1971 Incorporating Through Change 4, June 24, 1991 SUBJECT: The National Security Agency and the Central Security Service ASD(I) Reference: (a)
More informationPreventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
More informationCOAST GUARD Observations on Progress Made and Challenges Faced in Developing and Implementing a Common Operational Picture
For Release on Delivery Expected at 10 a.m. EDT July 31, 2013 United States Government Accountability Office Testimony Before the Subcommittee on Coast Guard and Maritime Transportation, Committee on Transportation
More informationCyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record
Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Roberta Stempfley Acting Assistant Secretary for Cybersecurity and Communications
More informationApplication of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports
2005 SRI International SRI International Company Proprietary Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports Presented to: 10 th Annual Harbor Safety
More informationMatthew M. Blizard. Page 1. Matthew M. Blizard
Matthew M. Blizard Director Navigant Consulting, Inc. 35 Iron Point Circle, Suite 225 Folsom, CA 95630 Tel: 916-631-3252 Fax: 916-852-1073 matt.blizard@navigant.com Professional History Director, Navigant
More informationCOMBATSS-21 Scalable combat management system for the world s navies
COMBATSS-21 Scalable combat management system for the world s navies The COMBATSS-21 total ship combat management system was designed to deliver capability rapidly and affordably. Built on an open architecture,
More informationCoordinated Operation Capability Using Scalable C2
Coordinated Operation Capability Using Scalable C2 Authors: Hüseyin KUTLUCA, İbrahim AKSU, Arda ÜNAL MilSOFT Yazılım Teknolojileri A.Ş. Teknokent, 06800 ODTU Ankara / TURKEY hkutluca@milsoft.com.tr iaksu@milsoft.com.tr
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
More informationDepartment of Defense MANUAL
Department of Defense MANUAL NUMBER 3305.09 May 27, 2014 USD(I) SUBJECT: Cryptologic Accreditation and Certification References: See Enclosure 1 1. PURPOSE. This manual: a. Provides accreditation guidance
More informationJOINT STATEMENT OF THE SECURITY CONSULTATIVE COMMITTEE
JOINT STATEMENT OF THE SECURITY CONSULTATIVE COMMITTEE A STRONGER ALLIANCE FOR A DYNAMIC SECURITY ENVIRONMENT The New Guidelines for Japan-U.S. Defense Cooperation April 27, 2015 By Minister for Foreign
More informationTWENTY-NINTH ANNUAL Federal Networks2016 FEBRUARY 17-18, 2016 TYSONS, VA
and,in association with AFCEA present TWENTY-NINTH ANNUAL Federal Networks2016 29 th Year! FEBRUARY 17-18, 2016 TYSONS, VA HEAR THE LATEST ON: EIS Task Orders and Transition Army Installation Requirements
More informationCybersecurity Delivering Confidence in the Cyber Domain
Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your
More informationHow To Do Business With Northrop Grumman
How To Do Business With Northrop Grumman November 9, 2011 Tizoc S. Loza Corporate Program Manager SEBP / Government Relations HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY
More informationDepartment of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
More informationTOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy. 2012-2016 23 February 2012
(U) SIGINT Strategy 2012-2016 23 February 2012 (U) Vision (U) Ensure Signals Intelligence provides THE decisive edge in advancing the full spectrum of U.S. national security interests. (U) Mission (U)
More informationDefense Security Service
Defense Security Service Defense Security Service Cybersecurity Operations Division Counterintelligence UNCLASSIFIED Defense Security Service DSS Mission DSS Supports national security and the warfighter,
More informationU.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
More informationOne Hundred Twelfth Congress of the United States of America
S. 3454 One Hundred Twelfth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the third day of January, two thousand and twelve An Act
More informationDHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
More informationDepartment of Defense INSTRUCTION. SUBJECT: Defense Research, Development, Test and Evaluation (RDT&E) Information Exchange Program (IEP)
Department of Defense INSTRUCTION NUMBER 2015.4 February 7, 2002 USD(AT&L) SUBJECT: Defense Research, Development, Test and Evaluation (RDT&E) Information Exchange Program (IEP) References: (a) DoD Instruction
More informationINTELLIGENCE AND HOMELAND DEFENSE INSIGHT
I N D U S T R Y INTELLIGENCE AND HOMELAND DEFENSE INSIGHT INTELLIGENCE AND HOMELAND DEFENSE CHALLENGES The Intelligence Community (IC) needs the right information, in real time, to make critical decisions.
More information(1) Acquisition Professional of the Year. (3) Major Acquisition Activity Award. (4) Field Acquisition Activity Award
a. Non-Monetary Awards. All individual award recipients will receive a plaque. Winning activities will receive a plaque and/or other suitable award for appropriate display at the respective command. The
More informationAn Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5132.13 January 9, 2009 USD(P) SUBJECT: Staffing of Security Cooperation Organizations (SCOs) and the Selection and Training of Security Cooperation Personnel References:
More informationStrategic Design. To learn more about the Naval Facilities Engineering Command, please visit us at www.navfac.navy.mil and www.facebook.
To learn more about the Naval Facilities Engineering Command, please visit us at www.navfac.navy.mil and www.facebook.com/navfac Strategic Design Naval Facilities Engineering Command 1322 Patterson Avenue,
More informationCybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION SUBJECT: National Defense Intelligence College University (NDIC NIU) NUMBER 3305.01 December 22, 2006 Incorporating Change 1, February 9, 2011 USD(I) References: (a) DoD
More informationOperation IMPACT (Injured Military Pursuing Assisted Career Transition)
Operation IMPACT (Injured Military Pursuing Assisted Career Transition) January 2013 Operation IMPACT Program Management Office Northrop Grumman Today Leading global security company providing innovative
More informationC ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
More informationDEFENSE BUSINESS SYSTEMS. Further Refinements Needed to Guide the Investment Management Process
United States Government Accountability Office Report to Congressional Committees May 2014 DEFENSE BUSINESS SYSTEMS Further Refinements Needed to Guide the Investment Management Process GAO-14-486 May
More informationPRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING
BACKGROUNDER Point of Contact: Mr. James L. Lindsey (703) 704-0194 James.L.Lindsey8.civ@mail.mil PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING Product Director, Enterprise Content,
More informationSITUATIONAL AWARENESS MITIGATE CYBERTHREATS
Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events
More informationNATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
More informationPOLICIES CONCERNING THE NAVAL POSTGRADUATE SCHOOL. 1. Purpose. To update and clarify policies concerning the Naval Postgraduate School.
DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON. D.C. 20350 1000 SECNAVINST 1524.2B DASN (MPP) October 27, 2005 SECNAV INSTRUCTION 1524.2B From: Subj: Secretary of the Navy
More informationApril 15, 2015. Re: Docket Number USCG-2014-1020. Dear Captain Tucci,
April 15, 2015 Captain Andrew Tucci Chief, Office of Port & Facility Compliance, U.S. Coast Guard U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200 New Jersey Avenue SE
More informationUSCG HEADQUARTERS TELEPHONE DIRECTORY
CCG Commandant 202 372 4411 CG 00EA Executive Assistant 202 372 4400 CG 00EA1 Staff Assistant 202 372 4404 CG 001 Military Aide to the Commandant 202 372 4415 CG 002 Staff Assistant/Scheduling 202 372
More informationNavy Information Dominance Industry Day
Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic
More informationCybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
More informationENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE
ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality
More informationForecast to Industry 2015 External Contracting Opportunities
Forecast to Industry 2015 External Contracting Opportunities Mr. Douglas W. Packard Director, Procurement Services Directorate 2 November 2015 UNCLASSIFIED 109 103 ENCORE III Navy Maintenance Database
More informationJOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
More informationEncl: (1) Surface Warfare Tactical Requirement Group Membership
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 5420.113 N9 OPNAV INSTRUCTION 5420.113 From: Chief of Naval Operations Subj: SURFACE
More informationDepartment of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
More informationSpace and Naval Warfare Systems Center Atlantic
Space and Naval Warfare Systems Center Atlantic Charleston Defense Contractors Association 40 th Small Business Industry Outreach Initiative 23 June 2016 Mr. Chris Miller SSC Atlantic Executive Director
More information