February 3, OI&T Enterprise Strategy: Putting Veterans First



Similar documents
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

VA Office of Inspector General

VA Office of Inspector General

VA Office of Inspector General

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

POSTAL REGULATORY COMMISSION

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative

1 Published on September 14, 2015, and January 6, 2016, respectively.

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

Enterprise Security Tactical Plan

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

DHS IT Successes. Rationalizing Our IT Infrastructure

Department of Veterans Affairs

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

VA Office of Inspector General

Application Overhaul. Key Initiative Overview

NARA s Information Security Program. OIG Audit Report No October 27, 2014

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

Qlik UKI Consulting Services Catalogue

Douglas County School District. Information Technology. Strategic Plan

EVALUATION REPORT. The Department of Energy's Unclassified Cybersecurity Program 2014

FREQUENTLY ASKED QUESTIONS

IBM Internet Security Systems October FISMA Compliance A Holistic Approach to FISMA and Information Security

Middle Class Economics: Cybersecurity Updated August 7, 2015

THE TELECOM MANAGEMENT ECOSYSTEM: A Progress Report on Vendor Value, Enterprise Efficiency Gains and Business Impact

IT Standards & Contract Management

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

Agency Services. Moving Ahead. Agency Services Road Map

Audit of the Board s Information Security Program

Internal audit strategic planning Making internal audit s vision a reality during a period of rapid transformation

"Service Lifecycle Management strategies for CIOs"

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

Department of Homeland Security

ERP. Key Initiative Overview

Cybersecurity in the States 2012: Priorities, Issues and Trends

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

Reliable, Repeatable, Measurable, Affordable

At the Heart of Connected Manufacturing

FFIEC Cybersecurity Assessment Tool

AUDIT REPORT. The Energy Information Administration s Information Technology Program

IT-CNP, Inc. Capability Statement

Summit Platform. IT and Business Challenges. SUMMUS IT Management Solutions. IT Service Management (ITSM) Datasheet. Key Benefits

Position Description: Chief Information Officer Department: Information Technology Information Technology FLSA Status: Exempt. Revised: October, 2014

Bridging the HIPAA/HITECH Compliance Gap

IT Service Management. The Role of Service Request Management

STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO

Paperless Office Solution Framework for Banking & Financial Services A Business Process Automation (BPA) Approach

Services Providers. Ivan Soto

Agency for State Technology

Department-wide Systems & Capital Investment Programs

Domain 1 The Process of Auditing Information Systems

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

Following is a discussion of the Hub s role within the health insurance exchanges, the results of our review, and concluding observations.

September 10, Dear Administrator Scott:

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Overview. FedRAMP CONOPS

Ann Geyer Tunitas Group. CGEIT Domains

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

How To Manage Security On A Networked Computer System

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE

GOVERNMENT USE OF MOBILE TECHNOLOGY

Office of Inspector General

A Managed Storage Service on a Hybrid Cloud

Strategic Plan Network Optimization & Transport Services

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

NASA OFFICE OF INSPECTOR GENERAL

Information Security for Managers

Security from a customer s perspective. Halogen s approach to security

Configuration Management System:

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

GEARS Cyber-Security Services

Evaluation of DHS' Information Security Program for Fiscal Year 2014

BPA Policy Cyber Security Program

Eastern Illinois University information technology services. strategic plan. January,

Information Technology General Controls And Best Practices

Critical Controls for Cyber Security.

IT Operations Management: A Service Delivery Primer

2014 Audit of the Board s Information Security Program

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

Physical Infrastructure Management Solutions

Information Technology Strategic Plan /23/2013

Caretower s SIEM Managed Security Services

CLOUD COMPUTING SERVICES CATALOG

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

UNITED STATES COMMISSION ON CIVIL RIGHTS. Fiscal Year 2012 Federal Information Security Management Act Evaluation

Strategic Plan FY

2015 List of Major Management Challenges for the CFPB

HHSN W 1 QSSI - Quality Software Services, Inc

Audit of the Department of State Information Security Program

The Data Lifecycle: Managing Data through Business. Ewan Willars Friday 27 February

2015 Strategic Business Plan Franklin County Data Center Ishreth Sameem, CIO

Under the Digital Dome: State IT Priorities, Trends and Perspectives

Review of the SEC s Systems Certification and Accreditation Process

Optimizing the Data Center for Today s State & Local Government

Dynamic Service Desk. Unified IT Management. Solution Overview

IT UNIFICATION Vision, Impact & Strategy. May 2015

Transcription:

OI&T Enterprise Strategy: Putting Veterans First

Objectives Provide an overview of the IT Enterprise Strategy Share O&IT s opportunities Gain your feedback on our way forward Answer any questions about our direction and plans 2

3

Given the complexity, it was evident that implementing one or two projects would not fix this organization. 4

The new OI&T Transformation Strategy is the result of in-depth analysis of numerous sources. Industry partners IT leaders Business partner leadership All Employee Survey VA Senior Leadership myva task force Multiple OI&T Assessments Strategic plans Congress Oversight: OIG, GAO etc. Employee feedback Survey results 5

After centralization in 2006, OI&T has been a tactical participant in VA s mission. Our Veterans need more. 6

We found opportunities in several key areas. PARTNERSHIP Lack of partner collaboration Shifting partner needs Protracted and misaligned acquisition process Prolific shadow IT IT used to address/support poor process design CULTURAL Internally focused No talent management large skill gap Consumerization of IT Activity outweighs outcome Lack of data-driven decision making OPERATIONAL No standardization or quality controls Ineffective leadership & governance Lack of accountability No software lifecycle No asset/config management EXTERNAL FORCES Changing Veteran demographics Rising public expectations Growing cyber threats Internet of Things Next generation IT models 7

MyVA is also a key driver for our change. Improving the Veteran Experience Improving the Employee Experience Improving Internal Support Services Establishing a Culture of Continuous Improvement Enhancing Strategic Partnerships 8

We have focused on four key principles Not the rules of the past. Transparency Accountability Innovation Teamwork 9

Our strategic framework has five new elements. Collaborate with our business partners to create the best experience for all Veterans 1 Mission 2 Vision Become a world-class organization that that provides a seamless, unified Veteran experience through the delivery of state-of-the-art technology 3 Our Guiding Principles Stabilize and streamline core processes Eliminate material weaknesses Institutionalize new set of capabilities to drive improved outcomes 5 4 Technical Foundation Execution: Now, Near, and Future Mission alignment Data visibility and accessibility Data interoperability Infrastructure interoperability Information security Enterprise services 10

Our strategic framework centers on three key themes Stabilize and streamline core processes and platforms Eliminate material weaknesses Institutionalize new set of capabilities to drive improved outcomes 11

And spans three phases: Now, Near, Future. Value Strategic Framework Time 12

The framework can be used to support the future. 13

In addition, our goals are consistent with our business partners strategic plans. Business Partners Key Business Priorities OI&T Strategic Themes MyVA VHA VBA NCA Corporate Offices Improve functionality of existing systems Enhance system interop Ensure secure electronic options for Veterans Modernize IT management processes Ensure shared information for greater interaction across VA and externally Establish new mission-critical systems Expand virtual, mobile, and self-service options for Veterans Stabilize and streamline core processes and platforms Eliminate material weaknesses Institutionalize new set of capabilities to drive improved outcomes 14

Based on the strategy, we are establishing five new key functions. ENTERPRISE PROJECT MANAGEMENT OFFICE DATA MANAGEMENT ACCOUNT MANAGEMENT QUALITY AND COMPLIANCE STRATEGIC SOURCING 15

Our IT Account Managers (ITAMs) are responsible for managing the IT needs of our business partners Continuous 10-step process for strategic business alignment Trusted role models for enterprise collaboration & communication Leveraging the best practices on behalf of service improvement within VA Focus is on outcomes to the Veteran while supporting the customer Constant assessment & improvement focused on higher level of service and ensuring a seamless engagement within OI&T. 16

The ITAMs are supported by 5 key Customer Relationship Managers (CRMs) North Atlantic Pacific Midwest Continental Southeast who will transform the way we interact with our partners in the field. 17

We are establishing a clear, consistent process for understanding and communicating with our partners. Customer relationship knowledge workers will analyze data received from our CRMs. This information will provide OI&T a better approach to: VA Division ITAM CIO EPMO Issue resolution Change management Enterprise innovation Max.gov - provides a best-ingovernment approach to dynamic knowledge management. Pacific Midwest Continental North Atlantic Southeast 18

The EPMO leverages this constantly evolving partnership by selecting, developing, and delivering solutions with the Veteran in mind. 19

EPMO s portfolio and resource tracking will ensure constant visibility into all project activities. Outcomes Project portfolio and resource tracking 18-month portfolio view Metrics that matter Monthly portfolio health metrics Align portfolios to objectives Enhance visibility and governance Analyze and report portfolio performance metrics Ensure overall portfolio health Optimize resources for projects, people, and timelines 20

OI&T is improving the value of the products we deliver through strategic alignment, effectiveness, and consistency. PMAS Document Driven (58 Documents) Data Driven (7 Documents + ATO) 5 Phase Gates/Milestones 2 Critical Decision Events Multiple Release processes 1 Integrated Release process 6 month delivery cycle 3 month delivery cycle Ad-hoc hierarchy of programs and projects Waterfall Centric Security + Architecture late in the process Project-centered (tactical) Portfolio-based management Agile Centric Security + Architecture standards leveraged early, during planning Portfolio-centered (strategic) 21

In addition, we have four transformational initiatives within EPMO. NEW RELEASE PROCESS Single process for all partners Dedicated release owner Streamlined review, approval, and communication process ENTERPRISE CHANGE CALENDAR Partner-specific, unified calendar Continually updated Full visibility into upcoming releases TOOLS Consistent intake through VIP Request (VIPR) Time-tracking for all resources VETERAN-FOCUSED INTEGRATION PROCESS (VIP) Focused on value over artifacts Only two critical decision points Product team stays engaged for 90 days following release 22

We have the opportunity to improve the Veteran experience through data management, stewardship and analysis. 23

24

Our ultimate goal is to create a holistic view of the Veteran to improve their experience, care, and access. We will have a seamless data integration capability with DoD, answering the question of interoperability. Current: VA can view full service record. JLV our health interoperability with DoD Vets.gov: one login, one time CDI: creating the customer data interchange for the enterprise And a new Data Management Organization (DMO) function within OI&T 25

OI&T s DMO will unite VA s resources behind a common goal. DATA MANAGEMENT DMO Represents Process Excellence and Innovation Engages with the data steward (business owner) to ensure accuracy and security. Institutes data governance and a single source of the truth. Analyzes data sources to form a true enterprise data architecture. Establishes appropriate metrics for data efficiency, access and value. Identifies new opportunities to improve the Veteran experience. Ensures an enterprise-wide data linkage. 26

Our final two key functions will be established by the end of Q3. Establishes an organized, collaborative, streamlined approach to fulfilling enterprise requirements with solution providers. STRATEGIC SOURCING Manages COE for requirements development and vendor selection. Develops knowledge base for enterprise architecture needs and supplier alignment strategies Tracks Vendor performance and contract deliverables; manages feedback. Maintains and shares insights on new technologies and capabilities to improve the workforce knowledge base. Encourages buy first methodology. Ensures adherence to appropriate policies and standards leading to the elimination of the material weakness findings. Evaluates solutions for effectiveness. Establishes effective policy governance and standards. QUALITY AND COMPLIANCE Identify, monitor, and measure risks for a forward-looking assessment of compliance across the organization. Evaluates apps for compliance and quality. Ensures OI&T is prepared for audits. Manages correspondence with oversight bodies and tracks commitments to responses. 27

We are also transforming our OI&T Field Services Team. Customer Experience Deliver best-in-class, customer facing solutions that increase transparency. Example: SLAs for all organizations. Field Operations Transform field operations. Example: Leveraging SLAs to define support needed. Infrastructure Operations Service Desk Organizational Structure Operational Process Drive operational efficiency across infrastructure operations. Example: Migrate data and applications to cloud. Deliver best-in-class IT support for all enduser contact and communication. Example: Redesign of service desk Redesign organizational structure. Example: Focus on centers of excellence and proximity to customer. Focus on efficiency and effectiveness. Example: Data center consolidation strategy. 28

Our new enterprise security strategy focuses on eliminating our material weakness and provides defense in depth for all VA data. For the first time, security initiatives are fully funded and resourced. 29

Based on the IT Enterprise Strategy, we will close key actions in response to oversight recommendations, eliminating our label as a material weakness in VA. 30

ECST (CRISP) Material Weakness Plan: 2016 Finding # FY 15 Draft Language 3/31/16 6/30/16 9/30/16 12/31/16 Finding 1: Agency-Wide Risk Management Program Finding 2: Identity Management and Access Controls Finding 3: Configuration Management Controls Finding 4: System Development/Change Management Controls Finding 5: Contingency Planning Finding 6: Incident Response and Monitoring Finding 7: Continuous Monitoring Finding 8: Contractor Systems Oversight Status of Prior-Year Recommendations Average % Complete February for Finding 3, 2016 Recommended Projected % Complete 12/31/2016 1 Risk Management Program 8% 44% 73% 94% 94% 2 Health Eligibility Center (HEC) WRAP Authority to Operate (ATO) 33% 100% 100% 3 POA&M Roles & Responsibilities 7% 39% 55% 66% 66% 4 POA&M Updates 7% 39% 55% 66% 66% 5 POA&M Artifacts 7% 39% 55% 66% 66% 6 POA&M Artifacts Update (GRC) 7% 39% 55% 66% 66% 7 POA&M Automatic Closures and NIST 800-53 Revision 4 Updates 8% 74% 100% 100% 8 Security Plan Update Mechanisms 8% 74% 100% 100% 9 Security Document Update Process 4% 42% 49% 60% 60% 10 Password Policy Enforcement 26% 56% 88% 100% 100% 11 Access Reviews 17% 19% 54% 100% 100% 12 Audit Logs & Security Violation Reviews 5% 38% 69% 82% 82% 13 Two-Factor Authentication for Remote Access 90% 99% 99% 100% 100% 14 Remote Access Security Standards 0% 100% 100% 15 Enterprise Vulnerability Remediation 19% 46% 74% 84% 84% 16 Patch Management Program 19% 46% 74% 84% 84% 17 Configuration Baseline Scanning 12% 46% 79% 79% 79% 18 Medical Device & Non-OI&T Network Segregation 43% 43% 100% 100% 19 Common Control for Non-OI&T Networks 15% 53% 96% 100% 100% Finding Projected % Complete 12/31/2016 20 System Development & Change Control 18% 47% 80% 100% 100% 100% 21 Contingency Plan Update Process 25% 96% 99% 100% 100% 22 Backup Data Encryption 7% 39% 63% 75% 75% 23 Disaster Recovery Update Process 16% 26% 26% 26% 26% 24 Business Impact Analysis Update Process 9% 45% 45% 91% 91% 25 Incident Response Procedures 31% 58% 80% 80% 80% 26 ID & Monitor External Interconnections 11% 22% 41% 58% 58% 27 Data Exfiltration 7% 24% 29% 59% 59% 28 Approved/Unapproved Software 13% 45% 45% 100% 100% 29 Software Inventory 11% 44% 81% 100% 100% 30 Contractor Cloud System Monitoring 37% 89% 100% 100% 31 FISMA Systems Inventory 41% 81% 100% 100% FY6-3 Position Sensitivity & Rules of Behavior 27% 51% 64% 67% 67% FY6-4 Background Investigation Monitoring 27% 51% 64% 67% 67% FY6-8 Wireless Security 25% 36% 50% 50% 50% FY6-9 Encryption of Sensitive Data 23% 64% 64% 93% 93% 80% 96% 77% 57% 72% 100% 100% 69% 84%

ECST (CRISP) Material Weakness Plan: 2017 Finding # FY 15 Draft Language 3/31/17 6/30/17 9/30/17 12/31/17 Finding 1: Agency-Wide Risk Management Program Finding 2: Identity Management and Access Controls Finding 3: Configuration Management Controls Finding 4: System Development/Change Management Controls Finding 5: Contingency Planning Finding 6: Incident Response and Monitoring Finding 7: Continuous Monitoring Finding 8: Contractor Systems Oversight Status of Prior-Year Recommendations Average % Complete for February Finding 3, 2016 1 Risk Management Program 100% 2 Health Eligibility Center (HEC) WRAP Authority to Operate (ATO) 3 POA&M Roles & Responsibilities 79% 94% 97% 100% 4 POA&M Updates 79% 94% 97% 100% 5 POA&M Artifacts 79% 94% 97% 100% 6 POA&M Artifacts Update (GRC) 79% 94% 97% 100% 7 POA&M Automatic Closures and NIST 800-53 Revision 4 Updates 8 Security Plan Update Mechanisms 9 Security Document Update Process 62% 62% 75% 85% 10 Password Policy Enforcement 11 Access Reviews 12 Audit Logs & Security Violation Reviews 98% 100% 13 Two-Factor Authentication for Remote Access 14 Remote Access Security Standards 15 Enterprise Vulnerability Remediation 91% 100% 16 Patch Management Program 91% 100% 17 Configuration Baseline Scanning 87% 99% 100% 18 Medical Device & Non-OI&T Network Segregation 19 Common Control for Non-OI&T Networks Finding Project % Complete 12/31/2017 20 System Development & Change Control 100% 21 Contingency Plan Update Process 22 Backup Data Encryption 80% 96% 100% 23 Disaster Recovery Update Process 89% 100% 24 Business Impact Analysis Update Process 100% 25 Incident Response Procedures 80% 93% 100% 26 ID & Monitor External Interconnections 67% 67% 100% 27 Data Exfiltration 92% 100% 28 Approved/Unapproved Software 29 Software Inventory 30 Contractor Cloud System Monitoring 31 FISMA Systems Inventory FY6-3 Position Sensitivity & Rules of Behavior 76% 76% 85% 100% FY6-4 Background Investigation Monitoring 76% 76% 85% 100% FY6-8 Wireless Security 67% 67% 78% 78% FY6-9 Encryption of Sensitive Data 100% 100% 100% 100% 100% 100% 100% 100% 100% 100%

We are equipping our leaders with the tools they need to foster a sustainable legacy of Veteran focus and execution. 33

The Top 12 is our first step on that journey. Veteran touchpoints 1 Improve the Veterans Experience 9 Critical enablers Improve Employee Experience (to include leadership development) 2 Increase Access to Health Care 10 Staff Critical Positions 3 Improve Community Care 11 Transform OIT 4 Deliver a Unified Veterans Experience 12 Transform Supply Chain 5 6 7 8 Modernize our Contact Centers (to include Veterans Crisis Line) Improve the Comp & Pension Exam Develop a Simplified Appeals Process Continue to Reduce Veteran Homelessness IT has a role in all of the top 12 projects, requiring a relentless focus on execution and partner engagement and discipline. 34

Implementation of the OI&T Strategy and Top 12 Breakthrough Initiatives demand increased sophistication and executive agility. OI&T is taking steps now to address improved leadership skills. Emulating the concepts of Leaders Developing Leaders into internal training. Aligning training to behaviors that support the IT principles and strategy: only undertaking work that provides direct value to the Veteran. New leaders and role assignments are being used to infuse different perspectives into OI&T. Our leadership team will carry the torch for relentless execution. 35

Our customized development program carries benefits well beyond the leadership level. We will: Address long-term talent management challenges Develop meaningful employee career plans by the end of 2017 a first. Milestones for 2016: Go/no-go decision on current employee capability model. All executive and employee performance plans tied to the IT Enterprise Strategy. Talent management is not simply attracting the right people. It s retaining those with a passion and a commitment to our mission by fostering a compelling, rewarding environment. 36

OI&T will provide strong support for the 12 Breakthrough Priorities by accomplishing the following in 2016: Project Management Establish EPMO 100% of all projects in VIP Align all project managers to EPMO Design time tracking, put processes in place Define clear portfolios for business partners Assign Account Managers to each portfolio Delivery/Cost Effectiveness Stand up & standardize command center Develop and implement service catalog Redesign service desk and field operations; implement redesign Define strategies for managing data centers, telecommunication, and cloud Begin migration to managed services Quality and Compliance Establish quality and compliance organization to manage risk Close material weakness Enable PIV for 75% of VA employees Close 15 cybersecurity initiatives related to oversight recommendations Begin proactive tracking of commitments to oversight bodies People Customize and deliver ITIL and Agile training for key personnel Define curriculum to educate project managers Implement capability model or select suitable alternative Management s performance goals will be tied to the Strategy s goals. 37

Most importantly, OI&T will adopt innovation in its truest sense: a tool to approach our existing challenges. Innovation Improve alignment to Veteran experience (10%+) Establish customer relationship managers Deploy fully functional knowledge management database and associated processes to drive innovation across organization Establish data management organization and complete analysis of existing VA data sources Establish strategic sourcing function, complete analysis of initiatives with most potential for impact, and implement Relentless execution demands creative problem solving. OI&T is embracing innovation at our core not as an activity, but as a skill. 38

We know where we ve been We know where we are 39

And now you know where we re going. Our Mission: Collaborate with our business partners to create the best experience for all Veterans 40

QUESTIONS? 41