Information Technology Priorities
|
|
|
- Hugo Hunt
- 10 years ago
- Views:
Transcription
1 FISCAL YEAR 2016 Federal Government Information Technology Priorities by Michael Biddick CEO Fusion PPT
2 TableofCONTENTS AuthorʼsBio AboutFusionPPT TheITJuggernaut CybersecurityGetsReal TheAgileITEnvironment BigDataGettingBigger CloudComputing TheFutureofFederalIT
3 MichaelBiddick CEOFusionPPT UnderMichaelʼsleadershipasCEO,FusionPPThasachievedtriple-digitgrowthbecomingthepremierevendorindependentsystemsintegrationandconsultingpartnerwiththeirclients.Michaelisresponsibleforthe strategicvision,marketstrategy,projectqualityandisresponsibleforthecompanyʼsoverallperformance.for nearly20years,michaelhasworkedwithhundredsofgovernmentandinternationalcommercialorganizations providingexpertiseinoursolutions.michaelhasauniqueblendofdeeptechnologyexperiencecoupledwith businessandinformationmanagementacumenthatprovideabalancedapproachtoourbusiness.priorto joiningfusionppt,michaelspent10yearswithaboutiqueconsultingfirmandboozallenhamilton,developing enterprisemanagementsolutionsforawidevarietyofbothgovernmentandcommercialclients.hepreviously servedontheacademicstaffoftheuniversityofwisconsinlawschoolasthedirectorofinformation Technology. MichaelearnedaMasterʼsofScienceinInformationSystemsfromJohnsHopkinsUniversityanddualBachelorʼs degreesinpoliticalscienceandafro-americanhistoryfromtheuniversityofwisconsin-madison. MichaelisacontributingeditoratInformationWeekandNetworkComputingMagazinesandhaspublishedover 50articlesonCloudComputing,BigDataandApplicationPerformanceManagement.Michaelisalsotheauthor ofthebook FederalCloudComputing. Michaelholdsmultiplevendortechnicalcertifications,isacertifiedITIL v3expertandacertifiedbarista. 2
4 AboutFusionPPT ABOUTFusionPPT WeSimplifyEnterpriseIT. FusionPPTisanestablishedleaderinprovidingITconsultingandsystemintegrationservicestoorganizationswith challengingtechnologyinitiatives.sinceourinceptionin2009,wehavecontributedtothesuccessofhundredsofprojects, andmosthavespannedtheglobeintheirreachandimpact.ourabilitytoperformandaddvalueincomplex,diverse,and distributedenvironmentshasearnedusasolidgrowthrateandareputationasatrusted,capable,andresults-oriented serviceprovider. DeepTechnicalKnowledge,DiverseProjectExperience. LedbyveteranITprofessionalsandthoughtleadersintheindustry,ourteamhasamassedadepthandbreadthoftechnical knowledgeandexperiencethatwearepassionateaboutsharingwithourclients.weattractandhireonlysubjectmatter expertsandprovenperformers,andourculturefosterscollaboration,innovation,andanimble,team-basedapproachtohelp ourclientsachievetheirobjectives. BigFirmExpertise,SmallerFirmService&Agility. Asaprivatelyheldsmallbusiness,FusionPPTcombinesthebestpracticesandexpertisefoundatlargeconsultingfirmswitha nimble,entrepreneurial,andclient-focusedserviceteam.werewardandencouragefreshperspectives,creativity,and intellectualrisk-taking,andthisconsistentlyproducesmoreefficientandmorecost-effectiveitsolutionsforourcustomers. MissionFocused. AtFusionPPT,wetakeapartnershipapproachinallofourengagements,andourteamfunctionsasanintegralpartofthe clientsʼorganizations.weunderstandcomplexenterprisesandtheimportanceofnetworks,applications,andsystemsin deliveringreliablemission-basedservicestostakeholders.ourstaffisfocusedatalltimesonourclientsʼmissionsand ensuringthattheservicesweprovideandtechnologysolutionswerecommendareincompletealignment. ValueBeyondIT. The PPT inourcompanynamestandsfor People,Process,andTechnology, anditrepresentsacoreaddedvaluethatour teamoffers whichisadeepunderstandingofwhatittakestomaketechnologyinvestmentspayoff.ourexpertiseextends beyondphysicalandvirtualsystems.weaddressthecriticalsuccessfactorsofpeopleandprocess,definingsuccessatthe leveloforganizationalimpactandtheincorporationofnewsystemsintodailyworkflowsandjobfunctions.thefusing togetherofpeople,process,andtechnologyiscoretoour methodologyanditiscoretotechnologyprojectsbeing abletoattaintheirfinancialandoperationalobjectives. FusionPPTCompanyandTeamhighlightsinclude: Ÿ ISO9001:2008CertifiedOrganization Ÿ PrivatelyHeldFirm Ÿ LedbyITIndustryExpertsandThoughtLeaders Ÿ CollaborativeSubjectMatterExpert(SME)Team Approach Ÿ Agile,EntrepreneurialStaff Ÿ Diverse,ComplexProjectExperience Ÿ ProvenTrackRecordofSuccessfulDeployments Ÿ Global,Enterprise-Oriented Ÿ MultipleContractVehicles Ÿ Depth&BreadthofTechnologyExpertise Ÿ CommitmenttoExcellence Ÿ QualityFocused Ÿ FusionPPTInnovationLab CorporateInformation. DUNS: CAGECode:5H6B4 PrimaryNAICS:541611,541512, Ownership:Private,100%U.S SizeStandard:SmallBusiness,under$14M Certifications:ISO9001:2008,ITILv3,PMP D&BOpenRatings:95%CustomerSatisfactionRating 3
5 TheITJuggernaut WiththeFederalGovernmentITbudgetcontinuingto hoverbelow$80billion,thisfebruary,thepresident requesteda1.8percentincreaseoverthe$78.3billion agenciesestimatethey'llspendthisfiscalyear approximatelya10%percentincreaseoverfiscal2014 spending.atthesametimethepresidentreleasedhis budgetrequest,partisangroups,legislatorsand governmentwatchdogscriticizedtheoverallspending onitandvalueobtainedfromthisspending comparedtoprivateindustries. leaderswithinthegovernmentandcontractingcommunities?criticismaroundspendingandefficiencyalso runsparalleltohigh-profilesecuritybreachesofsomeofthemostsensitivegovernmentdatareportedoverthe pastyear.ifthissecurityissueisnotaddressed,breacheswillcontinuetooccurandincreaseinfrequency. InthisannualFederalGovernmentITPrioritiesreport,we'llexaminewherefederalITleadersshouldbefocusing theirtime,thekeychallengestheymustaddressinordertomeetanincreasinglycomplexitenvironment,and howtheycandriveinnovationacrossprograms. Whilelegislationandopinionsoriginatingfromthe Value Efficiency WhiteHousehavealwaysfocusedonmoreefficient, effectiveandsecuregovernmentitspending,the thirdappointedfederalcio,tonyscott,continuedto trumpetboldvisionsandfederalittransformation. ScottwasappointedbyPresidentObamainMarchof 2015andexplainedhow drivingvalueisalsoabout drivingefficiency inhisfirstspeech.someofhis proposedideasincluded adoptionofagile technologies and creatingtherightkindsof dashboardsthatwillhelpusunderstandwhether we'remakingprogressornot. Efficiency Adoptionof agile technology Dashboards GovernmentAgencies ITLeaders Communities Security Afundamentalquestiontoansweris:Arethesebold visionstricklingdowntoagenciesandrank-and-fileit 4
6 5 In2013,agenciesreceivednewguidancefromthe executivebranchintheformofexecutiveorder 13636:ImprovingCriticalInfrastructureCybersecurity. ThisExecutiveOrderwarnedthat thecyberthreatto criticalinfrastructurecontinuestogrowand representsoneofthemostseriousnationalsecurity challengeswemustconfront. Despitethemandates, someofthemostsignificantcybersecurityattacks againstgovernmentdatainourtimehaveoccurred overthepastyear. InJuneof2015,theOfficeofPersonnelManagement announcedthepersonneldataofmorethantwentyonemillionamericans.theopmreportedthattensof thousandsofstandardform86s(sf-86) whichare requiredforallservicemembersandciviliansseekinga securityclearance werestolen.thesf-86,a127- pagedocument,requiresinformationaboutfamily members,friendsandpastemployment,aswellas detailsondrugandalcoholuse,mentalillness,credit ratings,bankruptcies,arrestrecordsandcourtactions. TheOPMindicatedthateverypersonwhounderwent agovernmentbackgroundcheckduringthelast15 yearswasmostlikelyaffected. OPMstatedthathackersstole sensitiveinformation thatincludedaddresses,personalhealthandfinancial recordsandotherprivatedetailsof19.7millionpeoplewhohadbeensubjectedtoagovernmentbackground check,aswellas1.8millionothers,includingthevictims'spousesandfriends.thistheftwasseparatefrom,but relatedto,abreachrevealedlastmonththatcompromisedthepersonneldataof4.2millionfederalemployees, OPMreported. Otherhigh-profileattacksreportedoverthepastyearincludetheWhiteHousenetwork,StateDepartment network,unitedstatespostalservice,gaoandthehealthcare.govwebsite.thoseareonlytheentitiesthat havebeendetectedandreported.accordingtoareportissuedbymerritalk,thenumberofcyberincidents reportedbyfederalagenciestotheu.s.computeremergencyreadinessteamrosefrom48,562infiscalyear 2012to67,168infiscalyear2014,analarming38%increaseovertwoyears. CybersecurityGetsReal Limits Technology Inadequate Intelligence Insecure Architecture Emerging CyberThreat IT Investment Increase Security WorldClass TechServices FiscalYear2016:FederalGovernmentInformationTechnologyPriorities
7 6 InareportreleasedinMarch,TheDefenseScience Board,aciviliancommitteethatprovidesscientificand technicaladvicetothepentagon,statedthatthedod isnotpreparedtodefendagainstsophisticated, internationalcyberattacks.thereportpointedto "inherentlyinsecurearchitectures,"inadequate intelligence,andthesheerlimitsoftechnologyin defendingagainstemergingcyberthreats.it encouragesthedod'sciotoworkwithbranchesof themilitarytocreateanenterprisesecurity architecturethatincludesminimumstandardsfor ensuringa"reasonable"levelofdefensibilityand increasingtheprobabilitythatattacksaredetected. Overthelastthreeyears,cybersecurityhasrocketed tothetopofallprioritiesforfederalgovernmentit leaders.nootheritaspectismoreimportantto controlthanthesecurityoffederaldataand preventingaccesstocriticalcommandandcontrol systemsofcriticalinfrastructure. Toaddressthesesignificantcybersecurityconcerns, thefy2016ombbudget,releasedbythewhitehouse infebruary,focusedonbolsteringexisting cybersecurityprogramsandincreasinginfrastructure agility,whiledecreasingwaste.thebudgetrequest included$14billiontosupportcybersecurity programs,including ContinuousDiagnosticsand MonitoringofFederalsystems,theEINSTEINintrusion detectionandpreventionsystem,andgovernment-widetestingandincidentresponsetrainingtomitigatethe impactofevolvingcyberthreats. Whileanongoingthemeinthebudgetrecommendationswasinnovating withless, someagencies,suchas theveteran'sadministration,departmentofeducationandthedepartmentofhomelandsecurity,submitted requestsforsignificantbudgetincreases.evidence-basedpolicy,promotingexperimentationandevaluation wasalsonew,butmeasuredintermsofproposedinvestments.thethreemajorfocusesofthebudgetconsisted ofincreasingvalueinitinvestments,increasingsecuritytoprotectfederalinformationandresources,and conveyingworld-classtechservices. LastDecember,Congressedpassedfournewcybersecuritybillsthatthepresidentsignedintolaw.TheNational CybersecurityProtectionActof2014,S.2519,codifiestheDepartmentofHomelandSecurity'sexistingNational CybersecurityandCommunicationsIntegrationCenter(NCCIC),whichisafocalpointforinformationsharing. TheFederalInformationSecurityModernizationActof2014,S.2521,amendsthe2002FederalInformation SecurityManagementActtocentralizeFederalGovernmentcybersecuritymanagementwithintheDepartment ofhomelandsecurity,andalsodelegatesimplementationauthorityfordefense-relatedandintelligence-related informationsecuritytothesecretaryofdefenseanddirectorofnationalintelligence.thethirdbillfocuseson strengtheningthefederalgovernment'scybersecurityworkforceandimprovinghiringproceduresand compensationrangesforcybersecuritypositionsatthedepartmentofhomelandsecurity,whilethelastbill mandatesanassessmentofitscybersecurityworkforceeverythreeyears,inadditiontodevelopingastrategy forenhancingtherecruitmentandtrainingofcybersecurityemployees. FirstintroducedinApril,theCybersecurityInformationSharingActof2015iscurrentlystuckinCongressand facesoppositionfrommanyprivacygroups.withintheprovisions,it Permitsprivateentitiestomonitorand operatedefensivemeasurestopreventormitigatecybersecuritythreatsorsecurityvulnerabilitiesontheirown informationsystemsand,withauthorizationandwrittenconsent,theinformationsystemsofotherprivateor governmententities.authorizessuchentitiestomonitorinformationthatisstoredon,processedby,or transitingsuchmonitoredsystems. Whilelegislatorsandprivacygroupstrytostrikeabalancebetweencivil libertiesandcybersecurityprotection,hackerscontinuetosucceedinpenetratinginformationsystemsand CybersecurityGetsReal FiscalYear2016:FederalGovernmentInformationTechnologyPriorities
8 7 stealinggovernmentdata.theplethoraof Congressionalbills,ExecutiveOrdersand managementprioritiesmakescybersecuritynotjust anobjective,butalsoanationalpriority.still,thisbigpicturepriorityexistsinconjunctionwithcurrent cybersecuritythreatsthatagencyciosfaceonadayto-daybasis.adisconnectremainsbetweenlofty leadershipcybersecurityobjectivesandcompliance withcurrentcertificationandaccreditationpolicies andprocedures,stillmiredinbureaucraticprocesses.it cantakeuptoayeartoreceiveauthorizationto operate(ato)fromanewsysteminthefederal network.inmostcases,theseauthorizationsarestill paper-based,withcontinuousmonitoringlayeredon top. Toeffectivelyaddressthesecybersecuritythreats, governmentitleadersneedtotakeseveralconcrete stepstopreventadditionalsecuritybreaches.first, governmentleadersmustrationalizetheirapplication anddata,andeliminateredundantapplications.thisis oftenexercisedasacomponentofanapplication inventoryprocess.withtherighttools,application discoveryanddependencymappingcanbe accomplishedinashortamountoftime.second, EnterpriseArchitectureisneededtoalignsecurityand applicationinnovation,inordertoensurethe appropriatesecuritycontrolsareinplaceatthe CybersecurityGetsReal enterpriselevel.third,investmentsareneededforcontinuousmonitoringandsecuritytoolsthattestthe infrastructure. Oneofthemostvexingareasformanyorganizationstotackleischoosingthemixandcorrectlyimplementing securitytools.wethinkaboutthreelayersoftheitenvironmentthatarecriticaltoprotect:thenetwork perimeter,enterpriseapplicationsandend-userdevices.wealsoworktoembedautomationtopreventissues, incontrasttosimplyreportingonissues. NetworkParameter Enterprise Applications EndUser Devices NetworkParameter IntrusionDetection System(IDS) FireWall NetworkAccess Control(NAC) SecuritySoftwares Anti-Malware Anti-Virus Anti-Spyware DigitalCertificate PKI Enterprise Applications Civil Liberties Cyber Security Hacker Attack FiscalYear2016:FederalGovernmentInformationTechnologyPriorities
9 8 Atthenetworkperimeter,intrusiondetectionsystems (IDS)detectpotentialthreatstothenetworkandcan bedeployedasnetworkorhostapplications.the primaryresponsibilityisreportingpotentialincidents tothesecurityoperationsteam.networkaccess Control(NAC)productsenforcesecuritypoliciesand handleaccessauthenticationandauthorizationbased ontheirabilitytorecognizeusers,devicesortheir specificroles.ipblacklistingcanbeeffectiveifvery broad,whiledatalossprevention(dlp)toolscan monitorandtrackissuesfrompotentialinsiderthreats. Firewalls,oneofourprimarysecuritytools,also possessadvancedcapabilitiesthatincludeapplicationawarenessfeatures. Attheserverenterpriselevel,securitysoftwareis neededtoprotectagainstawiderangeofthreats. Anti-malwaretoolshelpsecurityadministrators identify,blockandremovemalware.bothanti-virus andanti-spywaresoftwarecanbedeployedtohelpit departmentsfocustheiranti-malwarepoliciesto identifyknownandunknownmalwaresources.newer identity-basedsecuritytechnologiesmanage authenticationandauthorizationthroughsuch methodsasdigitalcertificatesandpublickey infrastructure(pki)solutions. CybersecurityGetsReal Fromanend-userdevicestandpoint,mobiledevicemanagement(MDM)monitorsandcontrolssecurity configurations,policyenforcementandpatchpushestomobiledevices.theycanalsoremotelylocklost,stolen orcompromisedmobiledevicesandwipeallstoreddata,ifneeded.fordesktopsandlaptops,webbrowsing policiesandanti-virus/anti-malwaretoolsareessential. Monitor & Control Security Configuration Policies Enforcement Patch Pushes Web Browsing Policies Anti-Virus Anti-Malware Cell Phones and Tablets Laptops and Desktops MobilDevice Management(MDM) FiscalYear2016:FederalGovernmentInformationTechnologyPriorities
10 TheAgileITEnvironment Oneaspectthatmakesaddressingsecuritymore challengingforfederalagenciesisthecomplexityof manyapplicationenvironments.thedisastrousrollout ofthehealthcare.govsitewillliveonasalasting exampleoftheseshortcomingsandcomplexities.as oneresponsetotheshortcomingsofthe Healthcare.govproject,GSAcreatedanorganization called18f(locatedon18thandfstreetin Washington,D.C.).Thisgovernmentconsulting organizationfocuseson leanstartupmethods,open sourcecode,andcontemporaryprogramming languages. Oneoftheirkeyobjectiveshasbeento promotethetransitionfromwaterfallframeworksto agileones. Overall,Agilevaluesinteractionsoverprocesses, amongotherthings,andtimetodeliveryisquicker. Becausesmallcomponentsarecompletedsoonerand stakeholderfeedbackisreceivedfaster,changescan bemadeinashortertimeframe. otherstudiesshowthatwastecouldbeashighas$40billioncomparedtoprivatesectorspending.while agencyitleadersarefacedwithbalancingthisbroadrangeofpriorities,congressisstrugglingtoprovide effectiveitgovernanceacrossthemassivefederalbureaucracy. Earlierthisyear,FederalChiefTechnologyOfficerMeganSmithhighlightedtheimportanceofbuildinglarge andcomplexprojects,oneincrementalpieceatatime.speakingtotheact-iacignitinginnovationaudience, shenoted Let'snot'spec'thewholehugethingout.Let'sdotheminimumthingandthengetitoutthereand startiteratingwiththecommunity..thegeneralservicesadministrationreleasedanagile-onlycontracting vehicletoallowagenciestobuyservicesbasedonthefasterturnaroundspeed.incontrasttotraditional proposalefforts,contractorshavebeenaskedtosubmitexamplesofcodethatcouldbeevaluatedduringthe awardprocess. Asagenciesworktomovetowardsmoreagileprojects,thekeytotheapproachisusingvitalelementsofAgile; specificallyrequirements,designandtesting,andworkingcollaborativelyandsimultaneouslysothat deliverablesareproducedinashorterperiodoftime.developmentsprintsshouldconsistofone-ortwo-week incrementsandincludeauser-functionalitytestcasedocument.meetingsshouldbeheldonadailybasisonall testsites.themostsuccessfulagencieswillimplementagileasapilotacrossasingleapplicationorprojectand furtherrefineittofitthespecificneedsoftheorganization. AttheendofJuly,theHouseOversightand GovernmentReformCommitteeberatedthelackof progressagencieshavemadeinmakinggovernment ITmoreefficient.Federalagenciesarestillover budget,behindscheduleandmakingduplicated effortsthatwastebillionsofdollars.rep.darrellissa statedexpertsestimateasmuchas$20billionin FederalITfundingiswastedeveryyear.However, 9
11 BigDataGettingBigger Oneofthereasonsapplicationsneedtobedelivered fasteristodealwithanincreasingamountofdatathat isproducedwithinthefederalgovernment.dealing withmassiveamountsofdataisnotnew.allfederal agenciesareresponsibleforcreatingandmaintaining documentationontheirorganizations'functions, policies,decisions,proceduresandessential transactions.however,alargeshiftoverthepastfew yearshasbeenthedesiretomakeaportionofthis datamoreavailabletothepublic,aswellasdata producedthroughsensors,camerasandremote monitorsthatdidnotexistadecadeago. TheOpenGovernmentInitiative(data.gov)offersup datasetstothepublicthataregeneratedandheldby thefederalgovernment.data.govprovides descriptionsofthefederaldatasets(metadata), informationabouthowtoaccessthedatasets,and toolsthatleveragegovernmentdatasets.thesedata catalogswillcontinuetogrowasdatasetsareadded. Currently,over140,000datasetsexistonline.The governmentalsopublishesusageinformation.for example,over165,000peoplevisiteddata.govinjune andthesiteaveraged60,000monthlydownloadsover thepastyear. TheVeteransAffairs(VA)ResearchandDevelopment programlaunchedthemillionveteranprogram(mvp) tounderstandhowgenesaffecthealthandultimately improvehealthcareforveterans.mvpwillestablish oneofthelargestdatabasesofgenetics,militaryexposure, lifestyleandhealthinformation. Asidefromprocessingcapability,securestorageandtoolstoanalyzethistype ofdataareneededtoensurethatthesetypesofaggressiveprojectsprovidevalue. Atthesametime,theVAstruggleswithbasicclaimservices.Forexample,attheVA'sLittleRockRegionalOffice, ithad over1,000filebanksfullandoverflowingwithfilesandover102,000paperfiles."directorlisabreun stated"atthepeak,itwastakingus overeightmonthstocompleteaveteran'sclaimandalotofthatwas becauseitwaspaper.we'vegonefromovereightmonthstofinishaclaimtolessthanfourmonths."that'sstill asignificantamountoftimethatcouldbebetterspentinmorecriticalareas. MillionVetProgram(MVP) Genetic Military Exposure LifeStyle Health Information Security Storage Tools ImproveHealthCareforVeterans 10
12 CloudComputing TheGovernment'scurrentITenvironmenthasbeen characterizedby lowassetutilization,afragmented demandforresources,duplicativesystems, environmentswhicharedifficulttomanage,andlong procurementleadtimes. Deliveredcorrectly, commodityitserviceshostedinacloudcomputing environmenthavethepotentialtoplayamajorrolein addressingtheseinefficienciesandimproving governmentitservicedelivery. Largeagencieshavemoreresources,butalsoamore complexanddiverseitenvironment.smalleragencies havesimpleritenvironments,butfarfewerresources. Thecloudcomputingmodelcansignificantlyhelp agenciesgrapplingwiththeneedtoprovidehighly reliable,innovativeservicesquicklyandefficiently, despiteresourceconstraintsandhighlycomplex environments. Nowoverfiveyearsold,TheFederalDatacenter ConsolidationInitiative's(FDCCI)goalisto reducethe costofdatacenterhardware,software,andoperation, increasetheoverallitsecuritypostureofthe government,andshiftitinvestmentstomoreefficient computingplatforms. Agenciesthatareparticipating inthefederaldatacenterconsolidationinitiative showanestimated3,800datacenterclosingsbytheendof2015.theseconsolidationswillfreeup1.7million squarefeetofland,aswellassave$3.3billion.manyagenciesarestillstrugglingtomigratelegacyapplications thatdonotsupportvirtualization,anddealingwithaskillgapintermsofoptimizingvirtualizedapplications. Thecost,complexityandpoliticalwranglingoverwhoactuallycontrolstheseapplicationshasmadetheroadto cloudcomputingabumpyone. Thethreekeybarriersthatpersistingreatercloudcomputingadoptioncontinuetobeadisconnected acquisitionmodelthatdoesn'tsupporton-demandservices,legacysecurityaccreditationandauthorization procedures,andculturalresistancetochange.thekeymechanismforaddressingthissecuritychallengehas beenthefederalriskandauthorizationmanagementprogram,orfedramp.thisprogramprovides a standardizedapproachtosecurityassessment,authorizationandcontinuousmonitoringforcloudproducts andservices. CurrentlyonlyapplicabletoFISMA-moderateworkloads,thisapproachusesa doonce,usemany times frameworkthatsavesanestimated30-40%ofgovernmentcosts,aswellastimeandstaffrequiredto conductredundantagencysecurityassessments.currently,thefedrampprogramisdraftingstandardsfor FISMA-Highworkloadstoenablemoresensitiveworkloadstoexistinpubliccloudenvironmentsin2016and beyond. Disconnected Acquisition Model NOT SUPPORT On-demand services Legacy security accreditation and authorization procedure Cultural resistance to change 1 Key Barriers FedRAMP (Federal Risk and Authorization Management) 2 Standardized approach to security assessment Authorization and continuous monitoring for cloud products and services Only applicable to FISMA-moderate workloads FISMA-moderate workload Do once, use many times 3 FISMA-High workload (2016 and beyond) 11
13 TheFutureofFederalIT Whileindividualprioritiescanbecharted,therealityis thatalloftheseinitiativesintersectintoaunifiedit strategy.fromtheuserperspective,havingaccessible data,secureapplicationsandarobustinfrastructureall arebasicfunctionsofgovernmentit.withlimited budgets,governmentitleadersneedtoinnovatejust tosurviveandhandletheincreasingrelianceonit. Becausegovernmentbusinesscan'tbeaccomplished withoutit,itisnolongeranicheforapplication developers. thecloudcanstrengthensecurity,astheresourcesarepooledwithinalargercommunityofusers.thesetypes ofinnovationarenotonlyabouttechnology,butcenteronthedeep-seatedculturalperspectivesofindividual agencies. Whilegovernmentleadersestablishpriorities,agency ITorganizationsarestillstrugglingtoprovidebasic accesstoapplications,supportforlaptopsand commodityitactivities.whilemanypocketsof innovationexistthroughoutthegovernment,theonesize-fits-allprioritylistisachallengefordiverse agenciesthathavedifferentmissions,budgetsand objectivestoservecitizensandtheirusers. Amuchmoreaggressivestanceisneededonsecurity, especiallyintheuseofheuristictools.asthe complexityofthesecuritytoolenvironmentincreases, CISSOsneedtoconsiderhowthecorrelationofthese dataelementscanbecombinedandautomatedto preventhacks.astrongersharedenvironmentsuchas 12
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
The ROI of Automated Agentless Endpoint Management
V The ROI of Automated Agentless Endpoint Management A Frost & Sullivan White Paper Prepared by Ariel Avitan, Industry Analyst 2 TABLE OF CONTENTS The Impact of Endpoint Monitoring and Control Solutions
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Getting Started Guide
Getting Started Guide Before you set up your account, you may want to spend a few minutes thinking about what you want to get out of Flextivity. Of course, Flextivity helps you successfully manage basic
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 [email protected]
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
SECURITY CONSIDERATIONS FOR LAW FIRMS
SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,
ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö 22.9.2015
Siemens Osakeyhtiö Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö 22.9.2015 Restricted Siemens Osakeyhtiö 2015. All Rights Reserved. siemens.fi/answers Cyber security
Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
State of the States: IT Trends, Priorities and Issues
State of the States: IT Trends, Priorities and Issues OSC Financial Conference 2012 Doug Robinson, Executive Director National Association of State Chief Information Officers Fiscal recovery: budgets are
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! [email protected]
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! [email protected] 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS
A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS Every day McCann Security helps business decision-makers and stakeholders solve cybersecurity issues and protect their critical data and
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Accenture Cloud Platform Unlocks Agility and Control
Accenture Cloud Platform Unlocks Agility and Control 2 Accenture Cloud Platform Unlocks Agility and Control The Accenture Cloud Platform is at the heart of today s leading-edge, enterprise cloud solutions.
How To Cloud Compute At The Cloud At The Cyclone Center For Cnc
Cloud Computing at CDC Current Status and Future Plans Earl Baum March, 2014 1 Background Current Activities Agenda Use Cases, Shared Services and Other Considerations What s Next 2 Background Cloud Definition
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group Presented by: Michael Flavin and Stan Stahl Saalex Information Technology Overview Saalex Information
Dupaco Cafe Secure your business Your time is valuable how F-Secure can help you make the most out of it
Dupaco Cafe Secure your business Your time is valuable how F-Secure can help you make the most out of it 21 st November 2012, Voorthuizen Knut Vatnestrøm, Technical Service Manager Michael Dahl, Director
Symantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
Protecting Content and Securing the Organization Through Smarter Endpoint Choices
Protecting Content and Securing the Organization Through Smarter Endpoint Choices Prepared by Dan O Farrell Dell Cloud Client-Computing Finally a practical approach to protecting content and securing desktops
Thomas J. Schlagel Chief Information Officer, BNL
Thomas J. Schlagel Chief Information Officer, BNL PhD in Nuclear Physics from the University of Illinois at Urbana-Champaign in 1990 Joined BNL in 1990 as a Postdoctoral Associate in the Nuclear Theory
SECURE SHARING AND COMMUNICATION. Protection for servers, email and collaboration
SECURE SHARING AND COMMUNICATION Protection for servers, email and collaboration THE VALUE OF SECURITY Most malware attacks use software vulnerabilities to reach their targets. Only 90% of malware attacks
Network Security Solution. Arktos Lam
Network Security Solution Arktos Lam Dell Software Group(DSG) 2 Confidential Trend Dell Software addresses key trends Cloud Big data Mobility Security Management Security 3 Software We deliver security
CLOUD BASED SCADA. Removing Implementation and Deployment Barriers. Liam Kearns Open Systems International, Inc.
CLOUD BASED SCADA Removing Implementation and Deployment Barriers Liam Kearns Open Systems International, Inc. SCADA Traditional definition and application. SCADA DEFINITION Definition Supervisory Control
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
Symantec Endpoint Security Management Solutions Presentation and Demo for:
Symantec Endpoint Security Management Solutions Presentation and Demo for: University System of Georgia Board of Regents Information Technology Services Executive Summary Business Requirements To migrate
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the
Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution.
Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution Global July 2012 Contents Section Slide Numbers Executive Summary 4 Market
Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration
Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Part I of an ebook series of cloud infrastructure and platform fundamentals not to be avoided when preparing
Guide to AWS. Brought to you by
Guide to AWS Brought to you by Welcome to Ingram Micro Cloud For more than 35 years, Ingram Micro a Fortune 100 company with $30 billion in annual revenue has been successfully connecting IT technology
Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson ([email protected])
Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson ([email protected]) Theo Dimitrakos Chief Security Researcher, BT Research & Technology [email protected]
Introduction to Virtualization. Paul A. Strassmann George Mason University October 29, 2008, 7:20 to 10:00 PM
Introduction to Virtualization Paul A. Strassmann George Mason University October 29, 2008, 7:20 to 10:00 PM 1 Data Center Transformation 2 Scope of Virtualization Services 3 Virtualization Evolution 4
Policy-Based Security, Compliance, and Risk Management
Policy-Based Security, Compliance, and Risk Management Automated approach boosts agility, reduces risks of security breaches and regulatory non-compliance, and improves operating efficiency VMWARE WHITE
White Paper The Dynamic Nature of Virtualization Security
White Paper The Dynamic Nature of Virtualization Security The need for real-time vulnerability management and risk assessment Introduction Virtualization is radically shifting how enterprises deploy, deliver,
Endpoint Protection Small Business Edition 2013?
Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,
Securing Industrial Control Systems Secure. Vigilant. Resilient. May 2015
Securing Industrial Control Systems Secure. Vigilant. Resilient. May 2015 Cyber Security Securing industrial control systems: Don t be a victim of cyber-attacks Cyber security Just as the workplace is
VMware Virtualization and Cloud Management Solutions. A Modern Approach to IT Management
VMware Virtualization and Cloud Management Solutions A Modern Approach to IT Management Transform IT Management to Enable IT as a Service Corporate decision makers are transforming their businesses by
Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper
Vulnerability Audit: Why a Vulnerability Scan Isn t Enough White Paper May 10, 2005 TABLE OF CONTENTS Introduction: How Secure Are My Systems?... 3 Vulnerability: The Modern Meaning Of A Muddled Word...
CLOUD IN HEALTHCARE EXECUTIVE SUMMARY 1/21/15
CLOUD IN HEALTHCARE CURRENT STATE AND STRATEGIES THAT IMPACT THE BOTTOM LINE EXECUTIVE SUMMARY As healthcare organizations struggle with competing priorities such as HITECH/ARRA, Meaningful Use, ICD-10,
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Is the PCI Data Security Standard Enough?
Is the PCI Data Security Standard Enough? By: Christina M. Freeman ICTN 6870 Advanced Network Security Abstract: This paper will present the researched facts on Payment Card Industry Data Security Standard
Defending against modern cyber threats
Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation
INFORMATION TECHNOLOGY
INFORMATION TECHNOLOGY MISSION The mission of Information Technology is to deliver innovative, high quality, cost effective computing, networking, information management and business apps management services
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
CloudCheck Compliance Certification Program
CloudCheck Compliance Certification Program Ensure Your Cloud Computing Environment is Secure with CloudCheck Certification Organizations today are increasingly relying on a combination of private and/or
Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com
Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two
KPiSync. By Larry McGhaw, Chief Technology Officer
KPiSync By Larry McGhaw, Chief Technology Officer 1 Overview CONNX KPiSync is a Mobile Application to help users 'Visualize your Key Business Metrics on any device in real time'. The CONNX KPiSync solution
Cyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
Code of Practice for Cyber Security in the Built Environment
Brochure More information from http://www.researchandmarkets.com/reports/3085299/ Code of Practice for Cyber Security in the Built Environment Description: This code of practice explains why and how cyber
Cyber Essentials KAMI VANIEA 2
Cyber Essentials DR. KAMI VANIEA KAMI VANIEA 2 First, the news Office of Personnel Management http://www.usatoday.com/story/news/politics/2015/06/23/op m-hack-senate-archuleta-hearing/29153773/ KAMI VANIEA
A VIEW THROUGH THE FOG, A CLOUD SERVICE PROVIDER S TALE MARTIN BRADBURN, CEO
A VIEW THROUGH THE FOG, A CLOUD SERVICE PROVIDER S TALE MARTIN BRADBURN, CEO VALUE ADDED RESELLER Increasing value to clients SOLUTION PROVIDER TRANSFORMATION How do you classify IT Providers? Solution
HEALTH CARE AND CYBER SECURITY:
HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers
Economic Benefits of Cisco CloudVerse
Economic Benefits of Cisco CloudVerse Key Takeaways Executive Summary Cloud architecture enables IT to be delivered as a service and delivered only when it is needed over the network from central, secure
Ensuring security the last barrier to Cloud adoption
Ensuring security the last barrier to Cloud adoption Publication date: March 2011 Ensuring security the last barrier to Cloud adoption Cloud computing has powerful attractions for the organisation. It
Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service
Services > Overview MaaS360 Ensure Technical Safeguards for EPHI are Working Monitor firewalls, anti-virus packages, data encryption solutions, VPN clients and other security applications to ensure that
State of Security Survey GLOBAL FINDINGS
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord
Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
Economic Benefits of Cisco CloudVerse
Economic Benefits of Cisco CloudVerse Executive Summary Cloud enables IT to be delivered as a service, when and wherever it is needed, from central, secure, public and private data centers. Enterprises
overview Enterprise Security Solutions
Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
Emerging Trends in the Network Security Market in India, CY 2013
Emerging Trends in the Network Security Market in India, CY 2013 Advanced Threat Landscape will Give Rise to Increased Network Security Spending 9AC3-74 July 2014 Contents Section Slide Numbers Executive
Software Defined Hybrid IT. Execute your 2020 plan
Software Defined Hybrid IT Execute your 2020 plan Disruptive Change Changing IT Service Delivery Cloud Computing Social Computing Big Data Mobility Cyber Security 2015 Unisys Corporation. All rights reserved.
