UK UNCLASSIFIED. Crown Copyright 2012 UK UNCLASSIFIED



Similar documents
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

OUTCOME OF PROCEEDINGS

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

Overview TECHIS Carry out risk assessment and management activities

Technology management in warship acquisition

3. Provide the capacity to analyse and report on priority business questions within the scope of the master datasets;

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

HOSTED 25 GB of storage space per user, business-class , and shared calendars, powered by Exchange Online. Use your own domain name.

W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010

Technology Strategy April 2014

Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany.

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

Growth Through Excellence

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.

An ITIL Perspective for Storage Resource Management

Global Headquarters: 5 Speen Street Framingham, MA USA P F

T a c k l i ng Big Data w i th High-Performance

FTA Technology 2009 IT Modernization and Business Rules Extraction

Using Enterprise Content Management Principles to Manage Research Assets. Kelly Mannix, Manager Deloitte Consulting Perth, WA.

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

G Cloud 6. Service Definition: Unified Communications as a Service (UCaaS)

The overall aim for this project is To improve the way that the University currently manages its research publications data

Reaping the Full Benefits of a Hybrid Network

DOBUS And SBL Cloud Services Brochure

Master Data Management Architecture

Managing Change in Critical IT Infrastructure

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

G-CLOUD SPECIALIST CLOUD SERVICES

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;

Connect Renfrewshire

ITIL Introducing service strategy

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

MINISTRY OF DEFENCE. MOD Architectural Framework Concepts & Doctrine Community of Interest Deskbook

The Role of Business Capabilities in Strategic Planning. Sneaking up on Quality Using Business Architecture in a learning corporation

The Cyber Threat Profiler

UNCLASSIFIED. UK Archiving powered by Mimecast Service Description

GNSS Anti-Jam Technology for the Mass Market

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

ESKITP5023 Software Development Level 3 Role

10 Building Blocks for Securing File Data

Microsoft Core Solutions of Microsoft Lync Server 2013

BIG DATA + ANALYTICS

custom hosting for how you do business

Defending against modern cyber threats

THE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy Page 1 of 8

WHITEPAPER It s Time to Move Your Critical Data to SSDs

TEC Capital Asset Management Standard January 2011

Certified Information Professional 2016 Update Outline

[Type text] SERVICE CATALOGUE

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

Value to the Mission. FEA Practice Guidance. Federal Enterprise Architecture Program Management Office, OMB

Reliable, Repeatable, Measurable, Affordable

The Danwood Group Professional Services Offering DANWOOD

Director: Improvement and Corporate Services. Improvement & Corporate Services

Business Continuity Management Policy

How small and medium-sized enterprises can formulate an information security management system

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

A "Day in the Life" Exceptional Work Experience Joe Baxter IBM Collaboration Solutions. Twitter: joebaxter

Oracle Fusion Financials The Future Unearthed

LEARNING SOLUTIONS website milner.com/learning phone

1 About This Proposal

Clarity Assurance allows operators to monitor and manage the availability and quality of their network and services

ESKITP5022 Software Development Level 2 Role

Service Strategy. Process orientation Terminology Inputs and outputs Activities Process flow / diagram Process Roles Challenges KPIs

ESKISP Direct security testing

Defence Information and Communications Technology Strategy 2009

JOB DESCRIPTION CONTRACTUAL POSITION

NICE and Framework Overview

CLOUD COMPUTING IN PRIVATE DEFENCE NETWORKS

Big Data and Society: The Use of Big Data in the ATHENA project

2008 Small Business Technology Trends Survey: A Peer Perspective on IT in Small Business

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Oxford City Council ICT Strategy

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

Agilisys G-Cloud Service V

Technology driven security

opinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Providing a quality IT Support & Consultancy service in the South East

Enterprise Information Management

Transcription:

1

Embedding Architecture in the Enterprise Integrated-EA 2012 Wg Cdr Alex Hicks Cap ISTAR DPD Lead Planner Luke Tucker - Niteworks 2

Outline { Background { Approach { Benefits { Lessons { Wider Adoption 3

Background { The ISTAR & IO Enterprise (and Defence more generally) has historically provided specific, bespoke, domain and platform centric solutions to deliver Military Capability. { The Direct, Process & Disseminate Capability Investigation (DPD CI) sought to identify gaps, overlaps, shortfalls, redundancy and project inter-dependencies in the DPD portfolio in order to support the development of a coherent, affordable and viable DPD Capability Management Plan. 4

Approach { Developed a Service Taxonomy based upon Doctrine { Profiled projects within the DPD portfolio against the Service Taxonomy { Enabling the identification of functional overlaps and interdependencies { Use of differentiators to characterise projects and prioritise further intervention 5

Wing Commander Alex Hicks Direct Process and Disseminate (DPD) Approach 6

Approach - DPD Capability Planning Process Context Demand Supply Analysis Plan 7

UK UNCLASSIFIED Crown Copyright 2012 UK UNCLASSIFIED 8

DPD Capability Planning Process Context Demand Supply Analysis Plan 9

UK UNCLASSIFIED Crown Copyright 2012 UK UNCLASSIFIED 10

11

ISR Service Taxonomy Support to influence activities Support to tactical force protection measures ISR Service Taxonomy v2.1 Support to the prosecution of targets ISR Military Threat analysis and indicators & warnings Understanding of environmental implications Understanding of the physical, informational, human and social domains Direct Identify Intelligence Requirements Intelligence Requirements Management Collection Management Resource Brokering Resource Tasking Collect Collect i2 Integrate Collected i2 Distribute Collected i2 ISR Enabling Collation Evaluation Integration Interpretation Process Analysis Production Enterprise Management Information Assurance Knowledge Information Management Performance Management Process Management Resource Management Service Management Access Controls Accounting and Auditing Backup and Recovery Cryptographic Protection ID&A Vetting & Clearing Vulnerability Assessment Discover Print & Export Publish Query Retrive Subscribe Visualise Generate i2 Product Maintain i2 Database Disseminate Distribute Information Distribute Intelligence i2 Interaction Knowledge Base Information Management Physical Environmental i2 Structured i2 Unstructured i2 Accounting Indexing Meta-Data Management Replication & Synchronisation Storage C4 Enabling Voice Video Web Messaging Basic Grade Messaging High Grade Messaging Medium Grade Messaging Public Grade Messaging Collaboration Calendar Dedicated VTC Desktop VTC Document Collaboration Instant Messaging Whiteboarding ISR Technical C4 Technical Collect Spatial Data Infrastructure Specialist ISR Application Common Application Application Infrastructure Communications Network Gateway 12

DPD Capability Planning Process Context Demand Supply Analysis Plan 13

DPD Portfolio Baseline 14

Supply Vs Demand View Context Demand Supply Analysis Plan 15

DPD Capability Planning Process Context Demand Supply Analysis Plan 16

SO1 Sponsor Desk Officer P9 Line Project in architecture Sub Projects Lead User AFA (Phase 1, 2 and 3) ICG AOE ICG ASG Inc 1 ICG DGC Libraries ICG Steve Massetti P900184900 PICASSO IEC apps ICG PICASSO into GST ICG PRIDE CIS at WYTON ICG WYDE ICG Steve Massetti Future Deployable GEOINT ICG Ed Ackland P900369000 JISC ICG Riyaz P900092900 irepms / THUNDERCLOUD PJHQ Riyaz P900269600 MIDB Fleet Riyaz P900253800 SHERLOCK DIS Riyaz P900089900 UK BICES DIS Riyaz P900270900 UK STONEGHOST ICSP SHEPHERD Stage 1 Jt Cap Alex Hicks P900529000 SHEPHERD SHEPHERD Stage 2 Jt Cap SHEPHERD Stage 3 Jt Cap Monty P900764000 I3M ICSP Steve Massetti Defence Geospatial Service ICG IDC ICSP Alex Hicks IMINT INTEGRATION ICSP Monty MAJIIC ICSP P900271400 SOLOMON Alex Hicks Ed Ackland ABIME/JESC ICG Alex Hicks Secure Data Guard ICSP Ed Ackland DIAMOND/DCGS Air Mark Minell Maritime CS2 / MSIP DIS/Fleet P980058600 ATTACKER PJHQ Reggie P900522200 P980086500 IRM&RT PJHQ P980004000 ISR Services UOR PJHQ P980056200 IPA UOR PJHQ 17

Suspected Incoherence 18

Benefits { Identification of 83M savings { Common and improved understanding of the enterprise { Ability to express the contribution of projects in terms of Capability { Ability to make decisions holistically across the enterprise { Capability Gaps easily identified and impact articulated { Ability to drive out capability overlaps { Leverage latent capability to best effect { Ability to clearly articulate Capability Requirements to the Delivery Organisation 19

Lessons { Cannot manage enterprise based on services alone { Understanding of the operational context { Appropriate governance needs to be implemented { Brownfield constraints is key { Services need to be the common language by which the ISR Enterprise is described { Importance of seeking stakeholder buy-in { Significant commonality between C4 & ISTAR domains { Very painful process, requiring very strong leadership 20

Wider Adoption { Information Superiority Reference Architecture (ISRA) { MOD Transformation { ISR Services UOR { Used in-theatre to articulate, issues, constraints and bottlenecks { Dstl Research Goal/Programme Mapping { High- Level ISTAR & IO Reference Architecture (HIRA) 21

Questions? Wg Cdr Alex Hicks Cap ISTAR DPD Plans Luke Tucker - Niteworks 22