Consolidated Afloat Networks and Enterprise Services (CANES)



Similar documents
PEO C4I & PEO Space Systems Overview

Consolidated Afloat Networks and Enterprise Services (CANES)

The Protection Mission a constant endeavor

Technical Framework for Cloud Computing at the Tactical Edge

Encl: (1) Surface Warfare Tactical Requirement Group Membership

Looking at the SANS 20 Critical Security Controls

SANS Top 20 Critical Controls for Effective Cyber Defense

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Managed Services. Business Intelligence Solutions

Space and Naval Warfare Systems Center Atlantic

How To Develop A Data Center Cost Model

MSP Service Matrix. Servers

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Space and Naval Warfare Systems Center Atlantic

THE TOP 4 CONTROLS.

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Federal Aviation Administration

Cyber R &D Research Roundtable

CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS H CH-63

White Paper: Consensus Audit Guidelines and Symantec RAS

INFORMATION TECHNOLOGY ENGINEER V

Defense Daily Open Architecture Summit 2014 PEO IWS Open Architecture Implementation

Information Technology Solutions

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

IT Networking and Security

WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION

ONR/PEO IWS/PEO C4I Combat System (CS)/Command and Control (C2) Limited Test Experiment (LTE) and Results: A SOA Success Story

DoD Application Store: Enabling C2 Agility?

The Information Technology Program Manager s Dilemma

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Accenture Cyber Security Transformation. October 2015

CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS F CH-48

Enterprise Computing Solutions

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

Bellevue University Cybersecurity Programs & Courses

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

National Initiative for Cybersecurity Education

CYBER CENTER OF EXCELLENCE:

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Defending against modern cyber threats

Critical Controls for Cyber Security.

IT Networking and Security

Intelligent Security Design, Development and Acquisition

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

DISA Acquisition Opportunities

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Cybersecurity The role of Internal Audit

2015 Defense Health Information Technology Symposium. Operations and Sustainment Services Supporting the Medical Enterprise

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

CYBER SECURITY WORKFORCE

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Space and Naval Warfare Systems Center Atlantic

Cybersecurity Health Check At A Glance

Facilitated Self-Evaluation v1.0

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

G2 Industry Day JULY Mr. Stephen Kreider PEO IEW&S. G2 Industry Day 29 July 2015 CLEARED FOR PUBLIC RELEASE

The State of DoD Biometrics

Kangas Cybersecurity strategy

KUDELSKI SECURITY DEFENSE.

How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives

Best Practices for Consolidation Projects

A Comprehensive Cyber Compliance Model for Tactical Systems

Since 2005 E-SPIN SDN BHD. All Right Reserved. SIEM - Log Consolidation Management (LCM) Solution

Information Assurance Workforce (IAWF) Contracting Officer Representative (COR) & Project Manager (PM) Workshop

Customized Cloud Solution

INCIDENT RESPONSE CHECKLIST

ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel

CompTIA Network+ (Exam N10-005)

METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide

NASCIO 2015 State IT Recognition Awards

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

VA Medical Device Protection Program (MDPP)

Remote Network Monitoring Software for Managed Services Providers

PacketTrap One Resource for Managed Services

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

Top 20 Critical Security Controls

PCI Requirements Coverage Summary Table

IT AUDIT WHO WE ARE. Current Trends and Top Risks of /9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Security Management. Keeping the IT Security Administrator Busy

NICE and Framework Overview

Department of Defense DIRECTIVE

Transcription:

Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) Consolidated Afloat Networks and Enterprise Services (CANES) Statement A: Approved for public release; distribution is unlimited (OCTOBER 2015) 27 Oct 2015 CAPT William McNeal CANES Program Manager (PMW 160) 619.524.7909 ben.mcneal@navy.mil Integrated Information Dominance for the 21 st Century PEOC4I.NAVY.MIL

PMW 160 Programs and Services We field and support C4I Tactical Networks Fleet-wide (LANs and WAN) Over 160,000 Afloat Network users Aircraft, ships and submarines Enables over 800 different applications Network Systems Consolidated Afloat Networks and Enterprise Services (CANES) Integrated Shipboard Network System (ISNS) Submarine Local Area Networks (SubLAN) Combined Enterprise Regional Information Exchange System (CENTRIXS-M) Sensitive Compartmented Information Networks (SCI Net) Patrol Coastal Network (PCNet) Maritime Operation Center Networks (MOC) Network Services & Transport Automated Digital Network System (ADNS) Operating Environment Application Integration / Early Adopters Afloat Core Services (ACS) Systems Management (SM) Fleet Introduction Team (FIT) The Navy s Tactical LAN and WAN Program Office 2

Status Full Deployment Decision Acquisition Decision Memorandum Secretary Kendall signed FDD ADM on 13 Oct 2015 Installations First install complete on USS McCampbell (DDG 85) in Oct 2013 25 ships complete (3 CVNs, 1 LHD, 2 CGs, 18 DDGs, 1 LSD) 12 installations continuing (4 CVNs, 2 LHDs, 5 DDGs, 1 LSD) Operational Testing Initial Operational Test & Evaluation (IOT&E), including cybersecurity testing, on USS Higgins (DDG 76) Operationally Effective, Suitable, and Survivable Force Level Follow On Test & Evaluation (FOT&E) on USS John C. Stennis (CVN 74) in progress Production Contract Limited deployment contract ended Dec 2014 IDIQ MAC Production contract in year 1 of 8 year period of performance CANES on USS RONALD REAGAN (CVN 76) 3

CANES High Level Overview Information Assurance Identification, Authentication & Access Control Configuration Protected Objects Forensics Examination Service Systems Management Malware Protection Core Enterprise Services Computing Infrastructure Transport Communications Printers (xn) Workstations (xn) Email/Calendar File Transfer SQL Database Office Productivity Video Distribution VoIP (xn) Servers (xn) Core Enterprise Services Wireless DNS LDAP PDA Synch Knowledge Management Domain 1 Domain 2 Domain 3 Domain 4 Encryption Service Boundary Protection 4 4

Tech Refresh Strategy Background Programmed to execute 2 year SW & 4 year HW baseline development cycle Significant end of life issues have potential to drive us out of cycle Change drivers Operating Environment and COTS Obsolescence Pace varying EOL and EOS timelines Support varying degrees of application portability Evolving Cybersecurity Requirements DoD and DON mandates Sales to foreign companies Task Force Cyber Awakening Corrective actions Installation Execution Requirements Shipmain requirements Fleet priorities Integration into total avail package Optimized Fleet Response Plan (OFRP) alignment CANES tech refresh cycle driven by COTS obsolescence, emerging cybersecurity requirements, and OFRP 5

Technology Refresh Implementation FY14 FY15 FY16 FY17 FY18 FY19 CANES Technology Refresh Strategy Ship receives latest version of CANES HW/SW Objective Baseline with EC/MOD and Release. Includes configuration updates, scheduled refresh of servers, switches, workstations and software/ operating environment. Objective Baseline 1 RELs: FAMs, Mailouts, WSUS Patches, IAVAs ECRs, Reqts Analysis, Development, TDPs, B/L and AI SITs MOD-01/SW2 RELs: FAMs, Mailouts, WSUS Patches, IAVAs ECRs, Reqts Analysis, Development, TDPs, B/L and AI SITs Objective Baseline 2 HW1/SW1 HW2/SW3 Hardware (HW) and/or Software (SW) Modification (MOD) - Changes to the CANES HW and/or SW baseline planned HW1 SW1 as necessary to address component obsolescence issues (end of life/sale/support) and software updates HW2 to current SW3 baseline. Releases (RELs) - Planned CANES system updates and fixes, implemented via Engineering Change Requests (ECRs) and packaged and released as FAMs, mailouts, WSUS Patches, or IAVAs. Addresses/includes system repairs, development fixes, CASREPs, Trouble Tickets, cybersecurity and software updates, associated procedures and media. Objective Baseline (OB) - Current as-is state of CANES. CANES OB-1 = HW1/SW1. OB-2 planned as HW2/SW3, will incorporate requirements not met in OB-1, and new stakeholder requirements. Incremental baseline changes, within scope of JROC approved CDD and IT Box plan to incorporate evolving commercial technology. 6

Cybersecurity and Computer Network Defense Framework Not easy, requires continuous attention as threat evolves Take holistic view vice individual vectors Must address all parts of the CND framework Protect Monitor, Analyze, and Detect Respond Capability Sustainment Vulnerability Scanning Support CND External Assessments Malware Protection Support and Training Network Security Monitoring / Intrusion Detection Attack Sensing and Warning Indications and Warnings / Situational Awareness Incident Reporting Incident Response Incident Analysis MOUs and Contracts CND Policies / Procedures CND Technology Development, Evaluation, and Implementation Subscriber Protection Support and Training Personnel Levels and Training / Certification Higher authority Direction and Implementation Information Assurance Vulnerability Management (IAVM) Security Administration CNDSP Information Systems 7

Industry Participation PEO C4I Gaps Document http://www.public.navy.mil/spawar/peoc4i/documents/peoc4i_st _Acq_GapsJune2014S.pdf Proposals require program endorsement for transition Tactical Cloud Enabling Capabilities Tools to support Efficient Installs Dynamic Modem to Router Interface Virtualized Networking Disruption/Delay Tolerant Networking 8

Where Industry Can Help Design and develop for maritime operating environment No shore tether (e.g. disconnected, intermittent, or low-bandwidth (DIL), Anti- Access/Area-Denial (A2AD) Continuous shore connectivity requirement is non-starter Apps and services need to be tolerant of latency and DIL environments Phased modernization can t get to entire Fleet in short time period Cyber Lower bandwidth patching and update processes Tools for entire computer network defense framework Speed to capability and End of Life Issues Products that facilitate quicker deployment Longer product life cycles and sustainment models that fit our environment and funding profiles Applications and services that are operating system agnostic or facilitate rapid changes in OSs Space, Weight, and Power (SWaP) Denser computing with lower SWaP requirements Looking for the best industry has to offer 9

PMW 160 Contract Opportunities Description Enterprise Engineering and Cyber Services Enterprise Program Mgmt / Acquisition / Financial / Contract / Admin Services ADNS Inc III Production Enterprise Integrated Logistics Support (ILS) Services Anticipated Award 3 rd Qtr FY16 1 st Qtr FY 17 4th Qtr FY17 1st Qtr FY18 SPAWAR has posted an updated three-year acquisition forecast to its public web portal entitled "SPAWAR 3 Year Acquisition Forecast" below. This forecast includes opportunities for SPAWAR Headquarters, SPAWAR System Centers Atlantic and Pacific. The forecast is informational only and does not constitute an offer or commitment by the Navy to fund, in whole or part, the opportunities herein. Vendors shall not contact any contracting or technical personnel regarding this information and all inquires shall be submitted via email to SPAWARSBO@navy.mil 10