This Conference brought to you by www.ttcus.com



Similar documents
Army Intelligence Industry Day Foundation Layer Technology Focus Areas

US Army Intelligence and Security Command (INSCOM)

This Conference brought to you by

Click to edit Master title style

G2 Industry Day JULY Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

The State of DoD Biometrics

Forecast to Industry 2015

Enterprise Capabilities Descriptions

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)

Cyber Domain and LandWarNet: Powering the Army AUSA 2012

Cyber Situational Awareness - Big Data Solution

Toward the Goal of Continuous Track and Identity

Reliable, Repeatable, Measurable, Affordable

How To Build A Cloud Based Intelligence System

Alaska Elevation Data Collection Update National Geospatial Advisory Committee

ACSAC CWID 2007 Data Diode Case Study. toll free

Providing On-Demand Situational Awareness

Operation IMPACT (Injured Military Pursuing Assisted Career Transition)

UNCLASS FORT GORDON GEORGIA CYBER REQUIREMENTS. MAJ Hurcules Murray TCM- CYBER DCO Chief 1 UNCLASS

UNCLASSIFIED. Army Data Governance. COL Linda Jantzen CIO/G-6 Acting Dir, Army Architecture Integration Center February 17, 2016 UNCLASSIFIED

DoD Strategy for Defending Networks, Systems, and Data

This Symposium brought to you by

Department of Defense DIRECTIVE

The Comprehensive National Cybersecurity Initiative

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Espionage and Intelligence. Debra A. Miller, Book Editor

Industry White Board Session

Mission-Critical Database with Real-Time Search for Big Data

PEO IEW&S AFCEA Briefing

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise

Combating Spear-phishing:

US Intelligence Community Thomas Patrick Carroll 1

Director of Intelligence Proposed Research Topics

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Accenture Cyber Security Transformation. October 2015

Systems Engineering and Integration Efforts. 11 Dec 2013

Department of Defense INSTRUCTION

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy February 2012

Bridging the Digital Divide with Net-Centric Tactical Services

Improvised Explosive Device Network Analysis

Threat Intelligence: Friend of the Enterprise

Update On Smart Grid Cyber Security

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

Space and Naval Warfare Systems Center Atlantic

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS K CH-63

Evolution Of Cyber Threats & Defense Approaches

Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

Simulation and Training Solutions

The 5 Most Influential Data Visualizations of All Time

Corporate Overview A

TechNet Land Forces South Small Business Opportunities. Carey Webster Director, Federal Information Solutions Deltek

Fight the Network. Presented By Kevin Jacobs On Behalf of WIN-T TMD and CERDEC S&TCD CyberOps Branches Briefing name l Date (1)

Enterprise Services to the Edge

Trusted Experience on Major Data Center Initiatives

Counterintelligence Awareness Glossary

AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration

ENABLING A RESPONSIVE AND AGILE INTELLIGENCE ENTERPRISE

SatCom For Net-Centric Warfare July/August MilsatMagazine

Zoonotic Disease Symposium US Army Veterinary Service

Forecast to Industry 2015 External Contracting Opportunities

Insider s Guide to Careers in Intelligence Analysis. hosted by Tom Hunter, MA, M.Litt. (Former DIA Senior Intelligence Analyst)

Meeting Cyber Security Challenges

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Exploiting Data at Rest and Data in Motion with a Big Data Platform

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente

Information Dominance as a Warfighting Discipline

A Comprehensive Cyber Compliance Model for Tactical Systems

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING

Some Thoughts on the Future of Cyber-security

Think Like a Green Beret and A Navy SEAL: Applying Military Special Operations Concepts to Grow Your Business and Career

DISA Testing Services for the Enterprise. Luanne Overstreet

Department of Defense INSTRUCTION

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

How To Protect Your It Infrastructure

How to avoid building a data swamp

Health Care Solutions

Flexible, Life-Cycle Support for Unique Mission Requirements

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

RC & CREATING DATA PRIVACY OPPORTUNITIES USING BIG IN EUROPE DATA AND ANALYTICS. risk compliance RISK & COMPLIANCE MAGAZINE.

Leveraging Network Infrastructure to Bring Critical Information to Users

CORPORATE CAPABILITIES. DOD RDT&E Services Enterprise Architecture & Portfolio Management Training & Logistics

Cloud Computing Strategy

ARSOF Conventional Army Integration: An Army perspective on integration and synergies in the current and future environment

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Architecture. Governance

Transcription:

This Conference brought to you by www.ttcus.com Linkedin/Group: Technology Training Corporation @Techtrain Technology Training Corporation www.ttcus.com

//FOUO ARSTAF Day at the Pre Command Course Army G 8 LTG James O. Barclay III Mr. Vince McCarron, Army G2 Big Data for Defense and Intelligence Symposium 03 December 2013 9 October 2015

Current Investments 1 DCGS-A 2 RITE Ubiquitous Access to Data Relevant Intelligence to Army s Access to IC, Joint ISR the Edge Integrated Foundry 3 Enhanced Force Sensors/Collectors 4 Intel Readiness 5 Structure Aerial, Terrestrial, Cyber Fully Leverage the Force No Cold Starts Data Transport Sensors Readiness No Cold Starts t No MI Soldier at Rest Force Structure DCGS A Hunte (Incr 1) Global Deployment Decision Build Out Army Global ISR Foundational Layer for RAF, AOC, COE DCGS A (Incr 2) RFP ICITE COE Command Post Computing Environment Harden & Resource Army s Expanding JWICs Network Info Assurance Accreditation User Monitoring Network Defense SCI Network Convergence RITE Rqts Into WIN T Ensure Access, Processing Power to Edge AISR Fleet Modernization GE Extended Range ARL, EMARSS, GEX Army Global PED Center CONOP, Mission Command Advance Improved Multi Functional Team Ground Platform Transition to Advanced SIGINT Sensors OSINT Across Force Expand Global HUMINT COE Sensor CE Compliance Foundry 2.0 In Base; Updating Program for RAF Increasing Live Ops at ECB RAF ISR Tng For Army GOs DCGS A on Networks Training Gray Eagle ISR CERTEX OSINT Certification of Force MICO/BCT S2 CERTEX Support to Targeting Intel Support to CEMA, Cyber Advanced SIGINT Upskilling Insider Threat Training 35 T Maint Tech Upskilling Data Scientists. Grow Out Now 2 More Theater Bdes 1 Aerial ISR Bde GE ER 3 Companies NGIC as Army ACE CI/HU Command 7x EMIBs 780 th MI Bde (Cyber) FOC Looking Forward Codify DPED Structure Codify GISA Structure Build OSINT Oversight Integrated with Mission Command //FOUO 3

Data Strategy Data Task: Track progress of design to requirements for intended mission environments and operational needs focusing on goals that support timely discovery, access, and use and concurrently support protection efforts to prevent compromise and mitigate t insider threat. id t Goals: 1. Support Multi-INT Integration 2. Improve Information Quality 3. Protect Information 4. Manage Access 5. Enable Leader Decisions //FOUO 4

Support Multi INT Integration Army Sensors & Data SIGINT HUMINT/CI GEOINT/FMV/UGS Biometric* GMTI CIED* STG* Prophet PRD 13 GRCS ARL MARSS* Green Dart* Wolfhound* DARBE* HIDRAH* Blackfin* LLVI Reporting Prophet CI Reporting IIR DIIR Civil Mil Ops* Patrol Debriefs* Key y Ldr Engagements* Village Rpt ing* Atmospherics* Constant Hawk* Highlighter* Desert Owl* Night Eagle* Saturn Arch* ARL MARSS* TACOP* Warrior Alpha* PGSS* Falcon Watch* Scorpion* OS II* WSS* UTAMS* PTDS* Copperhead* Puma* Raven Shadow Hunter Gray Eagle* LIDAR* Buckeye* CIB EO IR SAR GMTI VADAR* BAT* HIIDE* SEEK* NGIC Reporting* Watch List* BAT Dossier* COIC Reports CEXC Reports WIT Reports CIDNE Reports Exploit* CellEx Kits MEDEX Harmony TACDOMEX Data *Additions since CY2005 Others* Human Terrain Teams Provincial Reconstruction Teams Unit Reporting Transition Reports Reconstruction Culture Reports TTL Reporting Counter Intel Detainee Info National, Joint & Coalition Sensors & Data SIGINT HUMINT/CI IMINT/FMV/UGS Biometric* CIED* Exploit* NSA Products TACREPs KLs RTRG Alerts* DEA Information* Allied Information CIA Reports USMC Reports USAF Reports DIA Reports SOF Reports Coalition Reports* NATO Reports NGA CASi* USAF Unicorn* Predator Reaper U2 Global Hawk JSTARS LIDAR* EO IR SAR FMV DGS Reports SOF Reporting FBI ABIS USAF EYELID FBI TEDAC Coalition Reports JIEDDO/COIC JDEC Reporting NMED Reporting Navy Reporting Others* Law Enforcement Detainee Ops Threat Finance Tag, Track, Locate Continuously Changing to Satisfy Meet New Requirements and New Sensors/Data Sources by Leveraging Government, Industry, Allied and Academic Subject Matter Experts that Together, Create the Whole Intelligence Ecosystem //FOUO 5

Data Quality Data Visualization Data Warehousing Data Archiving Data Miningi Data Reuse Data Portability Data Repurposing Data Integrity Data Pedigree Data Elasticity Data Mobility Data Distribution Data Fusion Data Access Data Sharing Data Protection Data Dissemination Data Storage Data Variety Data Volume Data Velocity Data Veracity Data Exchange Data Breach Data Broker Data Dictionaryi Data Entry Data Governance Data Modeling Data Normalization Data Obfuscation Data Recovery Metadata Data De duplication Data Vl Value SmartData Data Discovery Data Tagging Structured Data Data Synchronization Data Integration Unstructured Data Data Consumption Data Ontology Semi Structured Data Data Modularity Data Exploitation ti Big Data I WANT YOU TO Data Extraction Data Transformation Data Correlation Data Taxonomy Data Collection Data Interoperability Data Spill Data Provenance Threat Data Unified Data Location Data Co MinglingData ENABLE ALL MISSION DATA NEEDS //FOUO 6

Data Protection OPERATIONAL IMPERATIVE Insider Threat WIKILEAKS Others Compromise OPM Breach Others Cost: $$$/Sources/Methods/Sharing Risk to the Army, Nation & Allies Assure our collectors, stewards and partners Risk management approach to data Threat counter measures & Mitigations Lifecycle management practices //FOUO 7

Enable Leadership Decisions Florence Nightingale, British Civilian Showed Disease versus Battle Charles Minard, French Civilian Showed Napoleon March to/from Moscow Multi INT Correlated Spatial Temporal Situational Force Effects Based Awareness Protection Targeting //FOUO 8

AMERICA S ARMY: Task Force Smith JULY 5,1950 162 KIA, WIA, POW JULY 6, 1950 540 Men 378 Men 24 Hours 24 Hours When Americas Army Is Not Ready //FOUO 9

Questions / Globally Engaged Regionally Aligned Enabling Decisive Operations //FOUO 10