Cyber Superiority. Weapon System Normalization Update. Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority. AFCEA Luncheon Jan 2015



Similar documents
DISA and the Evolving DoD Enterprise

Space Ground Services in the Joint Information Environment (JIE)

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Advanced Systems & Development

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

Department of Defense NetOps Strategic Vision

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

Forecast to Industry 2015

AFCEA JIE Mission Partner Symposium

DoD Strategy for Defending Networks, Systems, and Data

Cyber Situational Awareness - Big Data Solution

Cyber Workforce Training

How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives

Enterprise Services to the Edge

Navy Information Dominance Industry Day

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

Security Risk Management For Health IT Systems and Networks

Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, Internal Information Services

2 Gabi Siboni, 1 Senior Research Fellow and Director,

AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration

SUBJECT: Joint Information Environment Implementation Guidance

FREQUENTLY ASKED QUESTIONS

Empowering IT Acquisitions

AF Life Cycle Management Center

DISA Testing Services for the Enterprise. Luanne Overstreet

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0

Office of Warfighting Integration and Chief Information Officer SAF/CIO A6. Mission Brief

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy February 2012

How To Improve The Defense Communications System

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN VERSION 2

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

A Comprehensive Cyber Compliance Model for Tactical Systems

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

1 July 2015 Version 1.0

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

A Combat Support Agency

What s What Ahead For Architectures in the DoD? Mr. Dav Da e v DeVr DeV ies Mr. Martin Westphal

How To Improve Federal Network Security

ARMY TRANSFORMATION: THE MOVE TO NET-CENTRIC WARFARE AND ENTERPRISE INFORMATION MANAGEMENT

White Paper Assured PNT Inside Military Ground Vehicles Using D3

UNCLASS FORT GORDON GEORGIA CYBER REQUIREMENTS. MAJ Hurcules Murray TCM- CYBER DCO Chief 1 UNCLASS

DoD Joint Information Enterprise

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology

DISA Acquisition Opportunities

Joint Information Environment Single Security Architecture (JIE SSA)

National Initiative for Cyber Security Education

Description of the Joint Strategic Planning System (JSPS)

An Overview of Large US Military Cybersecurity Organizations

National Cyber Security Policy -2013

JTIMS Working Group 27 Aug

This Conference brought to you by

ReMilNet Service Experience Overview

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015

INFORMATION SECURITY STRATEGIC PLAN

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Integrated Cyber Operations Business Portfolio

Software Sustainment Issues and Challenges

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Douglas County School District. Information Technology. Strategic Plan

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Reliable, Repeatable, Measurable, Affordable

SSC Operations IT Transformation in Motion

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Unified Capabilities (UC)

Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Middle Class Economics: Cybersecurity Updated August 7, 2015

Enterprise Security Tactical Plan

4net Technologies. Managed Services and Cloud Solutions

G2 Industry Day JULY Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Department of Defense DIRECTIVE

Space and Naval Warfare Systems Center Atlantic

Chairman Johnson, Ranking Member Carper, and Members of the committee:

Strategic Plan Network Optimization & Transport Services

DoD Software Assurance (SwA) Overview

Partnering with Small Business

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

Core Data Center Reference Architecture

Industry White Board Session

CUSTOMER KEYNOTE Hal Buddenbohm

Cybersecurity: The Defense Perspective

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

Uncomplicated Communications

Center of Excellence Concept Plan

CyberSecurity Solutions. Delivering

Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP AP-2/03-1

APAN Brief. Governance

Systems Engineering and Integration Efforts. 11 Dec 2013

The Challenge. Shipboard crew members need training because cadres are not expected to provide a long-term ConOps for UUV employment.

Transcription:

Cyber Superiority Weapon System Normalization Update AFCEA Luncheon Jan 2015 Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority

Overview A5/8 Organization Where We Were/Are Way Forward Challenges Operational Context Priorities Cyber Requirements Summary 2

A5/8, Directorate of Strategic Plans and Requirements A5E EXECUTIVE SERVICES A5/8 STRATEGIC PLANS & REQUIREMENTS A5C SPACE SUPERIORITY A5F GLOBAL WARNING AND DEFENSE A5I CYBER SUPERIORITY A5M SATCOM AND PNT A5R LAUNCH AND REQUIREMENTS OFFICE A5X STRATEGIC PLANS AND REQUIREMENTS A5CF FUTURE REQUIREMENTS A5FG GROUND BASED WARNING A5IC CYBER OPERATIONS A5MP POSITIONING, NAVIGATION AND TIMING A5XC CONCEPTS AND PROCESSES A5CN COMMAND AND CONTROL A5FS SPACE BASED WARNING A5IM CYBER MISSION ASSURANCE A5MS SATELLITE COMMUNICATIONS SPACE A5XI BASING & INTERNATIONAL AFFAIRS A5CS SPACE SITUATIONAL AWARENESS A5CY DEFENSIVE SPACE CONTROL OFFENSIVE SPACE CONTROL A5FW ENVIRONMENTAL MONITORING A5IW CYBER WARFARE A5MT SATELLITE COMMUNICATIONS TERMINALS A5XP STRATEGIC PLANS A5XR STRATEGIC REQUIREMENTS A5I New A5XY STRATEGIC ANALYSIS 3

Where We Were Cyber WS Capability Production Documents Draft AFRRG AFROC JROC Cyberspace Vulnerability Assessment / Hunter Cyberspace Defense Analysis Air Force Cyberspace Defense Cyber Command and Control Mission System Air Force Intranet Control Cyber Security and Control System Challenges Differing views of the As Is capability fielded at the operational units Definition of Good Enough Lengthy coordination processes Baselining the As-IS Capabilities of CSAF-Approved Weapon Systems

Cyber Warfare DoDIN Ops Where We Are Today Cyber Weapon Systems in Sustainment Cyber Security Control Sys Air Force Intranet Control AF Cyberspace Defense Cyberspace Defense Analysis Cyber C2 Mission System Cyberspace Vulnerability Assessment/Hunter Network Attack System Baselined the As-IS Capabilities of CSAF-Approved Weapon Systems 5

Way Forward -- Challenges AF Cyber Mission Forces Unique Capabilities to CMTs and NMTs? Future of CPTs Joint Solution? N/CSTs RTO&I / Trainers / Range? AF Environment in JIE Move from AF Gateways to Joint Gateways Transition to commercial & milcloud Impact to AF Cyber Weapon Systems? 6

Way Forward - Operational Context USCYBERCOM/J3 Cyberspace Operations Environment 7

AFSPC/CC Cyberspace Activities Way Forward - Priorities 1. Defensive Counter Cyberspace (Recon/Counter Recon) 2. Offensive Counter Cyberspace for Global Reach & Access 3. Cyberspace ISR & Situational Awareness 4. Proactive Defense 5. Persistent Network Operations 6. Data Confidentiality & Integrity Systems (DCIS) 7. Network Extension & Resiliency 8. Cyberspace Command & Control 8

Way Forward - Cyber Requirements Utilize JCIDS Information Systems (IS) Methodology Introduced in most recent JCIDS guidance Greater flexibility to incorporate evolving technologies Fewer iterations validating documents through JCIDS process streamlines cyber capabilities development Accelerates delivery from concept to capability Delivers early and continuous capability; maturity iteration with operator feedback Embraces changing/refining requirements (not scope) Frequent communication and collaboration across stakeholders Normalized Requirements and Acquisition Processes Can Be Exploited To Deliver Sustainable Future Capabilities To The Warfighter 9

Way Forward Today & Tomorrow Today Unified Platform IS-CDD In-progress Cyber Protection Team CBA In-Progress Tomorrow AFIN Ops CBA Cyber C2/SA CBA AF Cyber Range CBA In-Progress Defensive Cyber Operations CBA Kickoff Feb/Mar 15 Capability Based Approach to Requirements Generation Functional Area Analysis Functional Need Analysis Functional Solution Analysis 10

Summary What we ve done Normalized our Cyber Weapon Systems AFSPC/CC reprioritized cyberspace activities What do we need from you? Understand process to modify weapon-systems in sustainment Help us identify dynamic and agile technologies to meet AF and Joint operational needs Then what? New cyber requirements documents enable continuous development and delivery of capabilities Identify what we need from industry and science and technology 11

Questions? 12

JIE What We re Doing AFNet Migration to JIE Pillars Connect Normalize Network Transport Single gateway/base boundary Next-gen MPLS NW core services consolidation Protect Single Security Architecture Single AFNet directory Regional security w/army-disa Single CND- SP Common Store Core Computing & Data Centers JIE Inc 1 CDC & application migration Application rationalization Enterprise Services Unified capabilities NIPR e-mail SIPR DEE C2 Enterprise Ops Centers Unified NetOps Unified service desk Global net mgmt 13