Network Operations (NetOps)
|
|
|
- Giles Weaver
- 10 years ago
- Views:
Transcription
1 Network Operations (NetOps) COL Debbie Theall Project Manager, PM I3C2 22 May 2013 UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 1 UNCLASSIFIED
2 Agenda UNCLASSIFIED Context NetOps Capabilities/Systems and Defensive Cyberspace Operations (DCO) NetOps Operational Construct Enterprise Service System as a Service (ESMSaaS) Army Enterprise Service Desk (AESD) Opportunities UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 2
3 Context UNCLASSIFIED U.S. Army NetOps capabilities have been generated, engineered, and procured in a decentralized manner across many commands and echelons Challenges: Disparate and non-interoperable systems/tools/configurations DOTMLPF material solution is getting ahead of the other components Doctrinal Disconnects: NetOps, Defensive Cyberspace Operations, DoD Information Network Operations (DoDIN), Joint Information Environment (JIE) CONOPS Multiple NetOps and Cyber Working Groups/IPTs Maintaining as is while moving to the to be Retrofitting the plane in flight The Army needs a more centralized approach to defining, validating, procuring, and fielding NetOps capabilities Currently looking at 25 NetOps systems to buy as a service or as a library of tools Working closely with the NetOps Trail Boss (PEO C3T) for strategic/tactical integration of capabilities for LandWarNet 2020 UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 3
4 NetOps Capabilities/Systems and Defensive Cyberspace Operations (DCO) IP Computing Platform Security Enterprise Support Enterprise Services & Application IP Network System (NetMan) 6+1 Host Based Security System (HBSS) 6+1 Network Access Control (NAC) Enterprise Services System (ESMS) 6+1 Database Element Manager Network Intrusion Prevention System (NIPS) Systems (SysMan) 6+1 IAVM IP Network Vulnerability Scanner 6+1 Domain Name Service (DNS) Directory Services Wireless Intrusion Prevention System (WIPS) Storage System Security Information System (SIMS) 6+1 IP Capacity, Availability, & Performance (CAP) Monitoring System Firewall Element Backup and Recovery Identity System Proxy Virtualization System (VSM) Crypto Security Router Element IAVM Computing Platform Switch Element Virtual Private Network (VPN) Deliver as a library of tools Deliver as a managed service More analysis required Component (AD not shown) * NDAA 2011 Section 933 stipulates the requirement to provide cyber quick reaction capabilities (QRC) Wireless IP Network We must balance the value of best business practices that come with a managed service against cyber mission requirements. UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 4
5 Enterprise Service System as a Service (ESMSaaS) One Global Workflow (Ticketing) System for the Army ITSM as a managed service makes sense to keep up with technology changes, hardware lifecycles, and leverage best business practices from industry 18 RFI responses received and tracked last fall. Major outcomes: Establish and maintain a strong, aggressive project team The Army must define its CONOPS and requirements Start small and incrementally expand (phase) Use long-term contracts (7+ years) Establish a Single Award Indefinite Delivery / Indefinite Quantity (IDIQ) Out of the box solution with some constraints Stakeholder will need training and business process reengineering assistance IPT stood up by CIO/G-6 to pursue a disciplined approach to fielding ESMSaaS (and future NetOps tools/services) Hybrid of NDAA 2012 guidance with Business Capability Lifecycle (BCL) UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 5
6 Army Enterprise Service Desk (AESD) Current State AESD First Global Single-Point-of-Contact for IT Incidents One Help Desk (People) with different Ticketing Tools and Processes End User/IMO Tier 1 Workflow Support System Tier 2-3 Enterprise Services Incident Enterprise Applications Incident Functional Command Incident CONUS Theater Incidents For Installations REPORTED BY PHONE CALL VERIZON ARMY RIGHTNOWWEB SELF SERVICE TICKET REPORTED BY PHONE CALL VERIZON ARMY ESD CSD HANDLED BY Tier 1 Triage agent Tier 1 Resolver agent OR REFERRED TO TIER 2 CONUS Enterprise DISA RightNowWeb Incident -Call -Web - Service Request Knowledge (Commercial RightAnswers, DISA Local Knowledge) Problem NETCOM ESMS Incident -Call - Referral Ticket Situational Awareness Notification NETCOM ESMS Referral Ticket Situational Awareness Notification Tier 2-3 Resolvers ACOIC/ T-NOSCs NEC Tier 2 CT-NOSC UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 6
7 Strategic Look Ahead - Opportunities The Army will continue to expand use of AESD to provide Tier 0 and Tier 1 support for all enterprise services while in parallel working replacement of current AESD contract: AESD Request for Information (RFI) issued to industry 20 MAY Sources Sought announcement with FEDBIZOPS Solicitation Number: W52P1J-13-T-0414 Seeking innovative input from Contractors Experience operating Contact Centers supporting Government/multinational organizations Core competencies in configuring and maintaining Call Center supporting technologies Proven management and staffing approaches Leverage ESMSaaS to provide one global workflow (ticketing) system for the entire Army UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 7
8 UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 8
Mission Partner Concept
Mission Partner Integration Mission Partner Concept Every CC/S/A who receives services from DISA has two aspects Customer A Bill Payer/Buyer of the Service An agreement holder (Service Level Agreement,
A Combat Support Agency
Department t of Defense (DoD DoD) Enterprise Email May 9, 2012 v2 Agenda Purpose: Create awareness of Department of Defense (DoD) Enterprise Email and increase AGENDA understanding of the service ss benefits
ARMY TRANSFORMATION: THE MOVE TO NET-CENTRIC WARFARE AND ENTERPRISE INFORMATION MANAGEMENT
BPM 2010 BPM CASE STUDIES BPM IN GOVERNMENT ARMY TRANSFORMATION: THE MOVE TO NET-CENTRIC WARFARE AND ENTERPRISE INFORMATION MANAGEMENT BPM 2010: Day 3, Wednesday, 15 Sept 2010, 10:45AM 12:15PM Scott Britt,
A Comprehensive Cyber Compliance Model for Tactical Systems
A Comprehensive Cyber Compliance Model for Tactical Systems Author Mark S. Edwards, CISSP/MSEE/MCSE Table of Contents July 28, 2015 Meeting Army cyber security goals with an IA advocate that supports tactical
Mission Oriented NetOps Situational Awareness. Mahmood Khan BMC Software Eric Howell BMC Software
Mission Oriented NetOps Situational Awareness Mahmood Khan BMC Software Eric Howell BMC Software Agenda Defining Situational Awareness (SA) Applying Business Service Management (BSM) to Achieve SA Questions
Joint Information Environment Single Security Architecture (JIE SSA)
Joint Information Environment Single Security Architecture (JIE SSA) Danielle Metz DISA JIE Special Assistant to the Mission Assurance Executive /JIE SSA Integrated Design Team Lead 12 May 2014 Problem
2014 Defense Health Information Technology Symposium Service Desk Strategy for the Defense Health Agency
Mr. Wayne Speaks - Acting Branch Chief Mr. Bill Novak - Acting Branch Chief of Operations DHA Infrastructure and Operations 2014 Defense Health Information Technology Symposium Service Desk Strategy for
Cyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
US Army Network Security Reference Architecture
US Army Network Security Reference Architecture (Aligned to the DoD Enterprise) Version 1.0 1 August 2013 Executive Summary The objectives of this Network Security Architecture are to reduce network complexity,
COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS, AND INFORMATION MANAGEMENT (C4IM) SERVICES LIST (UNCLASSIFIED FOUO)
COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS, AND INFORMATION MANAGEMENT (C4IM) SERVICES LIST Version 6, October 2015 for FY16 Implementation List of Network Enterprise ()/Directorate of Information Management
Partnering with Small Business
Partnering with Small Business Small Business Breakfast Ms. Essye Miller Director, Cyber Security, Army CIO/G-6 1 UNCLASSIFIED Army CIO/G-6 Organization CIO / G-6 Deputy, CIO / G-6 LTG Robert Ferrell Mr.
Network Management and Defense Telos offers a full range of managed services for:
Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:
Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN
Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010 Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
UNCLASS FORT GORDON GEORGIA CYBER REQUIREMENTS. MAJ Hurcules Murray TCM- CYBER DCO Chief 1 UNCLASS
CYBER REQUIREMENTS MAJ Hurcules Murray TCM- CYBER DCO Chief 1 Purpose Purpose: A broad overview of the current and emergent Army cyberspace requirements identified through capability based assessments,
DISA Testing Services for the Enterprise. Luanne Overstreet
DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information
Cybersecurity: The Defense Perspective
Cybersecurity: The Defense Perspective Ms. Essye Miller Director, Cybersecurity Army CIO/G-6 October 15, 2015 1 CIO/G-6 As the CIO As the G-6 Reports directly to the Secretary of the Army for setting the
PRESIDIO MANAGED SERVICES OVERVIEW JULY 2013
OVERVIEW JULY 2013 AGENDA Overview Capabilities Commitment OVERVIEW Capabilities Addressing today s IT challenges Our Capabilities and Approach Network Data Center Collaboration Security Workplace Service
Cyber Workforce Training
Cyber Workforce Training Mr Steve Jurinko DISA/PEO-MA 13 May 2014 1 DISA Cybersecurity Workforce Initiatives Cyber Workforce Coding DOD CIO initiative To identify the Cyber Workforce (CWF) across DISA
Infrastructure Development Forecast to Industry
Infrastructure Development Forecast to Industry Mr. Jack Wilmer Executive, Infrastructure Directorate 2 November 2015 51 Infrastructure Development Mission & Vision Mission Vision Slogan Enabled by We
Chief Review Services REVIEW OF DND/CF INFORMATION SECURITY. October 2002 7050-7 (CRS) Canada
REVIEW OF DND/CF INFORMATION SECURITY October 2002 7050-7 (CRS) Canada TABLE OF CONTENTS OVERVIEW... 1 INTRODUCTION... 1 Comparative Assessment of the DND/CF Information Security Program... 1 RECOMMENDATIONS...
DoD s Strategic Mobility Vision: Needs & Challenges
DoD s Strategic Mobility Vision: Needs & Challenges Greg Youst DISA Chief Mobility Engineer October 22, 2014 Agenda DoD Mobility Strategy Overview End-State Visions Implementation Challenges: A Reality
Access FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk
DoD IA Training Products, Tools Integration, and Operationalization
Defense Information Systems Agency A Combat Support Agency DoD IA Training Products, Tools Integration, and Operationalization Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation
N e t w o r k E n g i n e e r Position Description
Position Title: Group/Division/Team Network Engineer Business Technology Services / IT Operations Division Date October 2011 Reports to Roles Reporting to This Primary Objective Decision Making Authority
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Space Ground Services in the Joint Information Environment (JIE)
Space Ground Services in the Joint Information Environment (JIE) Scott Niebuhr, Jeremy Burton, Judy Kerner, Sky Troyer The Aerospace Corporation 2015 The Aerospace Corporation Space Ground Services in
DISA Acquisition Opportunities
DISA Acquisition Opportunities 2014 Forecast to Industry 1 CAE Acquisition Opportunities GCCS-J Program support Base year and one 1 year option with total estimated value of $5M Current PoP ends 28 Nov
California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE
Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4
7 th Signal Command Enterprise Email - Spiral 1. Concept of Operations 2012
7 th Signal Command Enterprise Email - Spiral 1 Concept of Operations 2012 March 3, 2010 Version 1.30 THIS DOCUMENT SUPERSEDES ALL PREVIOUS VERSIONS DISTRIBUTION: This document is intended for use by US
Forecast to Industry 2015
Forecast to Industry 2015 Networking Technologies Ms. Lisa Belt Deputy, Infrastructure Directorate 2 November 2015 87 Infrastructure Directorate IE1 Transport Division IE Infrastructure Directorate Email:
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Forecast to Industry 2015 External Contracting Opportunities
Forecast to Industry 2015 External Contracting Opportunities Mr. Douglas W. Packard Director, Procurement Services Directorate 2 November 2015 UNCLASSIFIED 109 103 ENCORE III Navy Maintenance Database
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
U.S. Army - Network Security Enterprise Reference Architecture
U.S. Army - Network Security Enterprise Reference Architecture (Aligned to the DoD Enterprise) Version 2.0 29 September 2014 UNCLASSIFIED Executive Summary The scope of this document includes all network
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
U.S. Army Network Operations Reference Architecture. (Aligned to the DOD Enterprise)
U.S. Army Network Operations Reference Architecture (Aligned to the DOD Enterprise) Version 1.0 6 March 2014 Executive Summary The Army relies on the current Network to support warfighting and business
Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute
Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute Service Level Management Service Level Management deals with how user service requirements are understood and managed.
DISA and the Evolving DoD Enterprise
1 DISA and the Evolving DoD Enterprise 11 June 2014 Major General Alan R. Lynn Vice Director, Defense Information Systems Agency 20th Century Circuit & Dial tone Delivery UNCLASSIFIED DISA is Changing
Army Service Level Management/Information Technology (IT) Metrics
Army Service Level Management/Information Information Exchange Forum Session: #1 IT Metrics Thomas J. Berezny NETCOM/9 th SC(A) G-5 Regulatory Guidance Scope Background Where Does the Data Go? Relationship
Cloud Services Catalog with Epsilon
Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these
How To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
How To Implement Itil V3
2009 NMCI Conference: Implementing ITIL Session 1: ITSM Process ITSM COE Agenda Background ITSM Overview ITIL and Service Delivery Adopting ITIL to NGEN SE&I Activities 2 Background Develop Government
DoD CIO ITSM Overview Enterprise Architecture Conference
DoD CIO ITSM Overview Enterprise Architecture Conference April 14, 2011 Barbara McCain Enterprise Architecture & Infrastructure DoD CIO [email protected] What is IT Service Management (ITSM)? ITSM
Cloud-based web hosting consolidation with an IBM Drupal solution
Cloud-based web hosting consolidation with an IBM Drupal solution Cut costs and strengthen enterprise web capabilities with a new cloud-enabled platform as a service (PaaS) Highlights Delivers proven enterprise
STIGs,, SCAP and Data Metrics
Defense Information Systems Agency A Combat Support Agency STIGs,, SCAP and Data Metrics Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation Division DISA Field Security
Managed Services. Business Intelligence Solutions
Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation
Service. Strategic Technology Solutions for DNA Technology Solutions and Services That Help You Optimize System Performance, Security and Availability
Service Strategic Technology Solutions for DNA Technology Solutions and Services That Help You Optimize System Performance, Security and Availability Products As your information systems grow more complex,
ICT Service Desk Team Leader. ICT Services Design Manager. Kings Way, South Melbourne. DATE: March 2015 ORGANISATIONAL ENVIRONMENT
POSITION: REPORTS TO: LOCATED: ICT Service Desk Team Leader ICT Services Design Manager Kings Way, South Melbourne DATE: March 2015 ORGANISATIONAL ENVIRONMENT Melbourne City Mission is a leader and innovator
Trusted Experience on Major Data Center Initiatives
Trusted Experience on Major Data Center Initiatives Modernizing and Building A New Generation of Data Centers Experience is the first thing you want in a data center provider. General Dynamics Information
DoD Cybersecurity Discipline Implementation Plan October 2015 Amended February 2016
DoD Cybersecurity Discipline Implementation Plan October 2015 Amended February 2016 Executive Summary... 3 Introduction... 4 Background... 6 Line of Effort 1: Strong Authentication... 6 Line of Effort
TechNet Land Forces South Small Business Opportunities. Carey Webster Director, Federal Information Solutions Deltek
TechNet Land Forces South Small Business Opportunities Carey Webster Director, Federal Information Solutions Deltek Agenda Review of Upcoming Opportunities for Small Businesses Army 8 Small Business Navy
Operationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63
CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS 18068-20K CH-63 Updated: July 2015 TABLE OF CONTENTS CRYPTOLOGIC TECHNICIAN (NETWORKS) (CTN) SCOPE OF RATING GENERAL INFORMATION CRYPTOLOGIC CYBERSPACE ANALYST
INFORMATION TECHNOLOGY SERVICES IT SERVICES PORTFOLIO
INFORMATION TECHNOLOGY SERVICES IT SERVICES PORTFOLIO Updated October 2010 Table of Contents Desktop and Customer Services... 3 Enterprise Application Services... 6 Department Specific Application Services...
IT Service Management in the JIE and the DoD Enterprise Service Management Framework
IT Service Management in the JIE and the DoD Enterprise Service Management Framework Office of the Chief Information Officer/ Defense Information Systems Agency Office of the Chief Information Officer
JOB DESCRIPTION QUESTIONNAIRE FOR SUPPORT STAFF
JOB DESCRIPTION QUESTIONNAIRE FOR SUPPORT STAFF JOB TITLE: REPORTS TO: Assistant Systems Administrator Technical Services Manager 1. PURPOSE OF THE JOB To support the delivery of IT services across the
SCHEDULE M Security Services
SCHEDULE M Security Services MANAGED SECURITY SERVICES The Managed Security Services Rate structure is generally composed of a Non- Recurring Charge (NRC) and a Monthly Recurring Charge (MRC). The NRC
LandWarNet Initial Capabilities Document NetOps Tools Convergence Strategy Update
1 LandWarNet Initial Capabilities Document NetOps Tools Convergence Strategy Update 11 September 2013 Al Morrison TCM GNE Signal CDID 1. LandWarNet Initial Capabilities Document (LWN ICD) LandWarNet ICD
Best Practices for Developing and Implementing the Right Monitoring Framework
24X7 NOC SERVICES Best Practices for Developing and Implementing the Right Monitoring Framework Next-Generation Network Operations Center Art Meierdirk Senior Director, Business Services INOC AGENDA: Challenges
How To Make A Theater Forest More Functional
Enterprise Directory Services & Authentication Information Exchange Forum Session: #2 EDS&A Robert Bachert NETCOM 9 th SC(A) G5 Will establish an Enterprise Directory Services and Authentication (EDS&A)
Commercial Practices in IA Testing Panel
Commercial Practices in IA Testing Panel March 22, 2001 Albuquerque, New Mexico First Information Assurance Testing Conference Sponsored by: Director, Operational Test and Evaluation Panel Members! Dr.
Defining a Secure Mobile Framework Architecture at DHA
Ms. Janine Oakley, Transition Manager Innovation and Advanced Technology Development Division 2015 Defense Health Information Technology Symposium Defining a Secure Mobile Framework Architecture at DHA
Company Overview. Enterprise Cloud Solutions
2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing
1. Contracting Officer Representative (COR)
DRAFT 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Contract Number: Task Order Number: United States Cyber Command (USCYBERCOM) OMNIBUS Performance Work Statement (PWS) USCYBERCOM Cyber Operations (J3) Task
NETWORKING ENTERPRISE SPECIALIST VoIP Project (New position)
Edmonton Catholic Schools is now accepting applications for the position of NETWORKING ENTERPRISE SPECIALIST VoIP Project (New position) Edmonton Catholic Schools is a large urban school district whose
Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org
Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation www.saferfoundation.org IMPORTANT NOTICE All proposal question and inquiries must be sent by email to
SENIOR SYSTEMS ANALYST
CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and
Enterprise Governance and Planning
GEORGIA TECHNOLOGY AUTHORITY Title: Enterprise Operational Environment PSG Number: SO-10-003.02 Topical Area: Operations / Performance and Capacity Document Type: Standard Pages: 5 Issue Date: July 15,
Army Telecommunications Division (ATD) Overview
Army Telecommunications Division (ATD) Overview Information Exchange Forum Session: 2 Telecommunications Jack Ratliff Army Telecommunications Division, NETCOM 9 th SC (Army) Manage Army s Worldwide Long-Haul
How To Improve The Efficiency Of A Federal Student Aid Program
U.S. Department of Education Federal Student Aid Virtual Data Center Concept of Operations Version 2.0 December 12, 2007 Document Version Control Document Version Control VERSION DATE DESCRIPTION 1.0 01/20/2006
NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES
NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES Introduction Les Chafin; Infrastructure Engineering Manager» HPES NASA ACES Responsible for:»
Service Automation to implement and operate your Cloud initiatives
Service Automation to implement and operate your Cloud initiatives Pierre AESCHLIMANN Principal Solution Consultant (EMEA Global Accounts) BMC Software ! Request, change, and support business services!
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67H CH-63
CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS 18068-67H CH-63 Updated: July 2015 TABLE OF CONTENTS INFORMATION SYSTEMS TECHNICIAN SUBMARINES (ITS) SCOPE OF RATING GENERAL INFORMATION INFORMATION
Year 2 Objectives 1. Phase out old ticketing system. 2. Promote self service features to users.
Three-Year Goals and Objectives Broad-based Support and Development Projects Revised - Spring 2012 Goal: Help Desk Ticketing System Overhaul Upgrade the information system used to operate the Technology
Reliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
HP and netforensics Security Information Management solutions. Business blueprint
HP and netforensics Security Information Management solutions Business blueprint Executive Summary Every day there are new destructive cyber-threats and vulnerabilities that may limit your organization
Code of Practice for Cyber Security in the Built Environment
Brochure More information from http://www.researchandmarkets.com/reports/3085299/ Code of Practice for Cyber Security in the Built Environment Description: This code of practice explains why and how cyber
AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015
AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
Evaluating Internal and Outsourced Models for Network Monitoring
Evaluating Internal and Outsourced Models for Network Monitoring A By Introduction Managing network availability and performance can be a difficult task for companies with limited IT resources and no real-time
Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI
1 Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI Tom Lerach Head of IA, HP DoD Rajat Bhargava StillSecure October 2009 Agenda endpoint compliance with NMCI
Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute
Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Remote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
