Empowering IT Acquisitions

Similar documents
DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

Cybersecurity: Mission integration to protect your assets

How Agile Development Can Transform Defense IT Acquisition

Bid & Proposal Cost: How can Government and Industry work to get Better Bang for your Buck?

Forecast to Industry 2015

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

Department of Defense Fiscal Year (FY) 2016 President's Budget Submission

DoD Strategy for Defending Networks, Systems, and Data

Secure Your Success. Intel Security Partner Program

AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration

The Department of Defense (DoD) has reached

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

CGI in Insurance. Preparing for Tomorrow, Today

Cloud Computing. Nahil Mahmood. CEO, Delta Tech Founder & President, CSA

Industrial Control System Cyber Situational Awareness. Robert M. Lee* June 10 th, 2015

System Security Engineering and Comprehensive Program Protection

BETTER BUYING POWER 2.0 INITIATIVES DESCRIPTIONS

Department of Defense DIRECTIVE

DoD Software Assurance (SwA) Overview

Department of Defense DIRECTIVE

Consulting. PMOver Transforming the Program Management Office into a Results Management Office

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR OPTIMIZING BUSINESS PROCESS MANAGEMENT IN GOVERNMENT

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

Advanced Systems & Development

FREQUENTLY ASKED QUESTIONS

The DoD Information Enterprise Strategic Plan and Roadmap (SP&R)

DoD Application Store: Enabling C2 Agility?

Department of Defense DIRECTIVE

Total Ownership Cost (TOC) and Cost as an Independent Variable (CAIV)

Department of Defense INSTRUCTION

Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015

Future-proofing Your Business with Open Marketing. By David Mennie, Senior Director, Product Marketing, Acquia

A NEW STRATEGIC DIRECTION FOR NTIS

The Information Technology Program Manager s Dilemma

Systems Engineering with RUP: Process Adoption in the Aerospace/ Defense Industry

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

How To Create A Healthcare Data Management For Providers Solution From An Informatica Data Management Solution

DoD CIO ITSM Overview Enterprise Architecture Conference

Cybersecurity in the States 2012: Priorities, Issues and Trends

Federal Cloud Computing Strategy

PROGRAM MANAGER S GUIDE

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology

ANALYTICS PAYS BACK $13.01 FOR EVERY DOLLAR SPENT

Space Ground Services in the Joint Information Environment (JIE)

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

Department of Defense Net-Centric Services Strategy

Department of Defense NetOps Strategic Vision

COMBATSS-21 Scalable combat management system for the world s navies

Government's Adoption of SOA and SOA Examples

This Conference brought to you by

How To Build A Cloud Based Intelligence System

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System

Information Technology Strategic Plan

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

World-Renouned Services

HOUSE ARMED SERVICES COMMITTEE SUBCOMMITTEE ON EMERGING THREATS AND CAPABILITIES STATEMENT

GOVERNMENT USE OF MOBILE TECHNOLOGY

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength

ODIG-AUD (ATTN: Audit Suggestions) Department of Defense Inspector General 400 Army Navy Drive (Room 801) Arlington, VA

STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

Healthcare Data Management

Strategic Plan Network Optimization & Transport Services

Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003

Department of Defense INSTRUCTION. SUBJECT: Information Technology Portfolio Management Implementation

Is it Time to Purchase a Fashion Enterprise Solution?

EL Program: Smart Manufacturing Systems Design and Analysis

DEFENSE INTELLIGENCE INFORMATION ENTERPRISE

Defense Contract Management Agency

DOD BUSINESS SYSTEMS MODERNIZATION. Additional Action Needed to Achieve Intended Outcomes

National Initiative for Cyber Security Education

Lawson Healthcare Solutions Optimization of Key Resources Forms a Foundation for Excellent Patient Care

alcatel-lucent Smart Plan solution Professional and Consulting Services

ElegantJ BI. White Paper. The Enterprise Option Reporting Tools vs. Business Intelligence

KUDELSKI SECURITY DEFENSE.

Department of Defense INSTRUCTION

NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN

Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield

A Systems Approach to Protecting the U.S. Air Traffic Control System Against Cyber-Terrorism

McAfee Security Architectures for the Public Sector

Profile. Business solutions with a difference

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

Transcription:

Empowering IT Acquisitions Public Release 66ABG-2015-0081 Tim Rudolph, Ph.D. AFLCMC Chief Technology Officer AF Tech Advisor, Integrated Information Capabilities 21 May 2015

The Point Value Deployed Rapidly to the Warfighter 2

Enabling the Warfighter Net-Centric warfare is today s reality but hindered by large weapon system approaches Procurement require extensive and costly engineering changes to become interoperable and sustainable Higher costs per traditional program and decreasing budgets Legacy base of capabilities requires sustainment and modernization to meet modern cyber threats Delivering Rapid Secure Capabilities Require Different Processes 3

Growing Software Dependency 4

AT&L Better Buying Power 2010: Better Buying Power 1.0 Deliver the warfighting capability we need for the dollars we have Restore affordability to defense goods and services 2012: Better Buying Power 2.0 Incentivize Productivity and Innovation in Industry and Government Eliminate Unproductive Processes and Bureaucracy Promote Effective Competition 2015: Better Buying Power 3.0 Provided specific initiatives for focus areas Remove barriers to commercial technology utilization Use Modular Open System Architecture Cybersecurity 5

Examples of Disruptive Change Air Cavalry / Helicopters 3D Printing Software Defined Everything Tank High Tech Manufacturing Internet of Things Cavalry Rust Belt Industry Integrated Circuit Military Industry Information Technology 6

Air Force Bending the Cost Curve Bending The Cost Curve (BTCC) is a complementary Air Force effort to BBP Three components: Enhancing interaction with companies Expanding competition to include nontraditional contractors Improving internal business analytics Plugfest Plus is a targeted event for expanding competition in the Distributed Common Ground System enterprise Adapt new acquisition approaches to rapid, agile capabilities 7

Late to Need Information Assurance adding 18 month+ Limited Value Controls vs risk based 6+ Years In last 5 years, poor success with ~50% termination/critical change rate Standalone Systems can take 6+ years to deliver, provided they are not terminated first.

Speed of Need C&A inheritance Granular, mission software focus Mission Component 6+ Weeks to Months The Assembled IT Capabilities Approach enables finegrained acquisition of mission components which are assembled with shared infrastructure and common technologies.

Modular Open System Architecture DCGS Int Backbone (DIB) Already a key enabler for information sharing and collaboration among previously isolated intelligence centers Licensed as open source software Published standards allow for increased competition and plug-in integration Allows for acquisition of modular capabilities As opposed to unwieldy system-of-systems gated by slowest development 10

Basic Assembled IT Capability Promise of Composability Realized 11

Cybersecurity Approach 1. Acquire a mission component 2. Authorize the mission component to be included in a previously accredited baseline 3. Assemble the mission component with domain infrastructure 4. Use the assembled IT capability, Iterate Tailored security requirements can be leveraged to rapidly field secure IT capabilities 12

The Future Compelling need: Rapid Secure Capabilities to the Warfighter Value proposition: Mission capabilities met through software speed Software can be enabled through Assembled Capabilities Reciprocity of security Software focused mission capability can succeed if supported by rapid, innovative acquisition approaches 13

Product Deliver Cost Effective Acquisition Solutions Deliver Affordable and Effective Product Support Process Launch High Confidence Sustainable Programs Standardize and Continuously Improve Center Processes People Develop and Place Right Person at Right Time Assure a Safe, Secure, and Quality Work Environment I n t e g r DELIVER i t y - S e TO r v COMMITMENTS i c e - E x c e l l e n c e 14