Keynote Address. MilCIS 2014. Mohan Aiyaswami Chief Technology Officer

Similar documents
Enterprise Architecture: A Governance Framework

Information and Communication Technology

Cybersecurity..Is your PE Firm Ready? October 30, 2014

Contents. Evolving Trends in Core Banking Transformation (CBT) Challenges Faced in Core Banking Transformation (CBT)

How To Manage Risk On A Scada System

Defining a Governance Model for Portals

Information Management & Technology (IM&T) Strategic Plan

Office of the Chief Information Officer

Five Core Principles of Successful Business Architecture. STA Group, LLC Revised: May 2013

Job Description. Job Title Branch Business Group Reporting to Location. Purpose. Key Tasks

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

Defending against modern cyber threats

Agency for State Technology

2.0 ROLES AND RESPONSIBILITIES

Setting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP

JOB PROFILE. For more detailed information about Internal Affairs, go to our website:

A HELPING HAND TO PROTECT YOUR REPUTATION

Information Technology Report MTA IT Department. MTA Finance Committee June 2015

Accountability Report. Department of Internal Services

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

According to NASSCOM-Frost & Sullivan's Study on 'Analytics' Product Excellence Matrix, the first in the seven-segment series

(100% taught in English)

Guidelines. for setting up. Dedicated Project Team. Page 1 of 14

Business-Focused Objectives Key to a Winning MDM Implementation

POSITION SPECIFICATION ENTERPRISE ARCHITECT UK&I

FAA Cloud Computing Strategy

Accenture Technology Consulting. Clearing the Path for Business Growth

Information Communication Technology

Five Core Principles of Successful Business Architecture

CACI Cloud Consulting Services

Software Defined Hybrid IT. Execute your 2020 plan

Cloud Computing Strategy. an addendum to the. Queensland Government. ICT Strategy Queensland Government

A. This Directive applies throughout DHS, unless exempted by statutory authority.

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center

Achieving High Performance with Cloud Computing in Uncertain Times Joseph Tobolski Director, Accenture Technology Labs

Bridging the IT Business Gap The Role of an Enterprise Architect

Cyber Security: from threat to opportunity

Appendix A-2 Generic Job Titles for respective categories

Best Practices for Consolidation Projects

Enabling Data Quality

Technology Strategy April 2014

IT-CNP, Inc. Capability Statement

Q3 IIBA Corporate Member Forum. Will start promptly on the hour

Visual Enterprise Architecture

WITH BUSINESS STRATEGY

Defence Information and Communications Technology Strategy 2009

Unifying IT Vision Through Enterprise Architecture

Simplify And Innovate The Way You Consume Cloud

WHY DO I NEED A PROGRAM MANAGEMENT OFFICE (AND HOW DO I GET ONE)?

Steve Sims Business Intelligence Competency Centre

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

Industrial Internet & Advanced Manufacturing

Full year results. Corero Network Security plc, the AIM network security company, announces its audited results for the year ended 31 December 2014.

Blue Fire Thames Court 1 Victoria Street Windsor SL4 1YB enquiries@bluefire-uk.com

How to Safely Migrate your ERP to the Cloud in Three Steps

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

Planning for a Successful Information Governance Program. Kathy Downing, MA, RHIA CHPS,PMP AHIMA Senior Director IG

HR Service Delivery: Campus Initiatives

BI STRATEGY FRAMEWORK

WHITE PAPER IT SERVICE MANAGEMENT IT SERVICE DESIGN 101

OCIO Strategy Page 1 CTZ

By Peter Merholz, If you use it, please attribute it. Thanks.

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

A NEW APPROACH TO CYBER SECURITY

State of Michigan Department of Technology, Management & Budget

Main Themes. Speakers Include: include. Event Agenda - Day One

Office of the Auditor General AUDIT OF IT GOVERNANCE. Tabled at Audit Committee March 12, 2015

DOD Medical Device Cybersecurity Considerations

Knowledge Driven Service Innovation and Management:

Data centre strategies for business growth in a hybrid cloud world

Division of Information Technology. Strategic Plan 2012 THE GEORGE WASHINGTON UNIVERSITY

Cyber Security VTT and the Finnish Approach

ITIL. Lifecycle. ITIL Intermediate: Continual Service Improvement. Service Strategy. Service Design. Service Transition

Three Strategies for Implementing HR in the Cloud

Data Governance from the ground up! A data architect s approach to data governance

Value to the Mission. FEA Practice Guidance. Federal Enterprise Architecture Program Management Office, OMB

Transcription:

Keynote Address MilCIS 2014 Mohan Aiyaswami Chief Technology Officer

Introduction A little bit about me Chief Technology Officer/Chief Information Security Officer Defence Responsible for: ICT Strategy, Technology Roadmaps and Architecture. Envisioning long term ICT Systems, Applications, Information Security and industry partnerships to be relevant to the future of Defence. Worked in a variety of roles in areas of technology, innovation, leadership, commercial and delivery across a large variety of businesses in Australia and around the world. Graduated from the University of Madras, with a Bachelor of Engineering.

Introduction Some of the highlights of my career The implementation of passenger reservation system for Indian Railways. Architect and Author of several products. Led the Enterprise Integration function for Coles Myer. Led the Enterprise Architecture Transition Program for Optus. CTO for manufacturing Vertical. IT strategy for Toll Group.

5 months in Some of our challenges The complexity of the Defence business and ICT landscape. The need for a holistic view of IT across Defence. Integrated ICT architecture that can address future needs of Defence. Information security that can address modern day cyber threats. Proliferation of data and information and the need to get relevant information from the data. Meaningful and clearly defined partnerships with Industry partners.

Operating Strategic The opportunities Shape the ICT Strategy and Governance for Defence (inline with the CIO s vision) A consolidated ICT strategy that is aligned to the Defence White Paper and can deliver the CIO s vision:. A single Defence ICT strategy and associated policies A strategy that is backed up a proper plan A plan that can be implemented; and A plan that can reflect the two speed ICT model. Shaping the project portfolio to reflect the strategic plan. A Governance structure that can ensure the success of the strategic plan.

Strategic Development a pragmatic and integrated architecture for Defence Make Enterprise Architecture a strategic asset for Defence. Ensuring a consistent framework and it s application is in place Understanding the deliverables of the current wave and plan for the next wave. Reviewing and revising Architecture Governance.. Developing the Integrated Defence Architecture that reflects the networked battle environment.

Operating Strategic Implement a comprehensive and contemporary Information & Security Strategy We have multiple stand alone networks. Information is distributed across all these networks. Modern day cyber threat can cause more harm than ever before. Securing the information as a holistic entity spread across all our networks is key.. Information security should detect and protect internal and external threats. We should be cognizant of ever evolving devices and infrastructure technologies.

Operating Strategic Shape two speed IT services Strategic plan that enables quick wins. Not compromising larger projects that need the time. Using CP and other flexible service delivery mechanisms. Enabling innovation as part of the strategic plan. Iterative prototyping where it is beneficial.. Business and Vendor engagement model to reflect the two speeds.

Operating Drive strategic engagement with Industry through a structured approach that supports innovation Share the strategy and vision with our strategic industry partners. Encourage them to come along with us in our journey. Provide clarity of engagement: Industry partners can be sure of opportunities; and Defence can be sure of Industry support.. Group Commercials branch has been established. Restructuring vendor governance. Establishing structured innovation with Industry.

Corporate and Enabling Services Strategic Core View: the Business Model Departmental Governance Advice to Government (Force Options) Whole of Government Services Advice to Government (Response Options) Strategy Development Capability Planning Raise, Train, Sustain Capability Development Preparedness (force-inbeing) Outcome 1 Conduct Operations Outcome 2 Outcome 1. Service Integration Financial Management People Management ICT Logistics Health Services Defence Support (Corporate Services) Legal Services Security Research & Development

Operating Security Strategic Business Architecture Aligning the various components and managing interdependencies is critical to the success of our business and military operations. Processes Services Information ICT Application Infrastructure

Strategic Sources of Innovation Innovation Model Internal R&D Entry Gate Review Gate Approval Gate Proof-of-concept / Prototype Go Gate Service Providers The Market Bench- Marking Innovation Proposition Criteria INNOVATION REGISTER Approval Gate Criteria Measure Operational. Unauthorised concepts

Working with Industry What role does Industry play? Industry is key to driving: Efficiencies and effectiveness Innovative ideas and solutions; and Developing current and future ICT Capability that support the business and military operations of Defence.

Questions?