Partnering with Small Business



Similar documents
Army CIO/G-6 Overview

UNCLASSIFIED UNCLASSIFIED

Cybersecurity: The Defense Perspective

Department of Defense DIRECTIVE

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

Armed Forces Communications & Electronics Association (AFCEA) Belvoir Chapter

Forecast to Industry 2015

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Cyber Situational Awareness - Big Data Solution

DISA Testing Services for the Enterprise. Luanne Overstreet

Reliable, Repeatable, Measurable, Affordable

Marine Corps. Commercial Mobile Device Strategy

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING

Unified Capabilities (UC)

Cyber Workforce Training

HHSN W 1 QSSI - Quality Software Services, Inc

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

DISA and the Evolving DoD Enterprise

Network Operations (NetOps)

A Comprehensive Cyber Compliance Model for Tactical Systems

LandWarNet 2020 and Beyond Enterprise Architecture

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

The Comprehensive National Cybersecurity Initiative

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

Systems Engineering and Integration Efforts. 11 Dec 2013

How To Improve The Defense Communications System

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition

Department of Defense INSTRUCTION

DON CIO Cyber/IT Workforce Management and Competencies

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

Department of Defense DIRECTIVE

DOD Information Assurance Training & Awareness Products To order our products, please go to the following website:

SUBJECT: Privileged Access to Army Information Systems and Networks. a. Army Regulation (AR) 25-2, Information Assurance (IA), 23 March 2009.

AUSA HOT TOPICS. Army Networks and Cyber Security in Force 2025 FINAL AGENDA 12 JUNE Crystal Gateway Marriott Arlington, Virginia

SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

Infrastructure Development Forecast to Industry

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as

Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING

DoD CIO ITSM Overview Enterprise Architecture Conference

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015

National Initiative for Cyber Security Education

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

Defense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability

Department of Defense DIRECTIVE

Modeling and Simulation (M&S) for Homeland Security

CYBER SECURITY WORKFORCE

Cybersecurity: Mission integration to protect your assets

Unified Capabilities (UC)

Department of Defense INSTRUCTION

Preventing and Defending Against Cyber Attacks November 2010

What is Unified Capabilities?

U.S. Army Network Operations Reference Architecture. (Aligned to the DOD Enterprise)

The Future of KM Implementation--A DKO Perspective

DISA Acquisition Opportunities

THE UNDER SECRETARY OF DEFENSE DEFENSE PENTAGON WASHINGTON, DC

UNCLASSIFIED. Army Data Governance. COL Linda Jantzen CIO/G-6 Acting Dir, Army Architecture Integration Center February 17, 2016 UNCLASSIFIED

GAO CYBERSECURITY HUMAN CAPITAL. Initiatives Need Better Planning and Coordination

UNCLASSIFIED. UNCLASSIFIED Defense Security Service Page 1 of 5 R-1 Line #178

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

Army Cloud Computing Strategy

THE UNDER SECRETARY OF DEFENSE DEFENSE PENTAGON WASHINGTON, DC

Operationally Focused CYBER Training Framework

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength

An Overview of Large US Military Cybersecurity Organizations

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

U.S. Military Cybersecurity-related Provisions Comparison Fiscal Year 2014 Space Foundation Page 1 of 13

The Department of Defense Strategy for Implementing the Joint Information Environment

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

Office of Warfighting Integration and Chief Information Officer SAF/CIO A6. Mission Brief

Mark S. Orndorff Director, Mission Assurance and NetOps

NICE and Framework Overview

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS K CH-63

Framework for Improving Critical Infrastructure Cybersecurity

Ports, Protocols, and Services Management (PPSM)

NASA OFFICE OF INSPECTOR GENERAL

2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report

The DoD Information Enterprise Strategic Plan and Roadmap (SP&R)

Report No. DODIG March 26, Improvements Needed With Tracking and Configuring Army Commercial Mobile Devices

SUBJECT: Army Information Technology Service Management (ITSM) Policy

FM 6-02 SIGNAL SUPPORT TO OPERATIONS

DoD s Strategic Mobility Vision: Needs & Challenges

National Initiative for Cybersecurity Education

Human Resources Management. Portfolio Management Concept of Operations

Advanced Systems & Development

The HIPAA Security Rule: Theory and Practice

National Cyber Security Strategies: United States

DoD Joint Information Enterprise

Army Intelligence Industry Day Foundation Layer Technology Focus Areas

This Conference brought to you by

Preventing and Defending Against Cyber Attacks October 2011

Network Management and Defense Telos offers a full range of managed services for:

SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK

DoD Strategy for Defending Networks, Systems, and Data

AF Life Cycle Management Center

September 24, Mr. Hogan and Ms. Newton:

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

Executive Summary. Army HR IT Strategic Plan 1

TechNet Land Forces South

DOD Medical Device Cybersecurity Considerations

Transcription:

Partnering with Small Business Small Business Breakfast Ms. Essye Miller Director, Cyber Security, Army CIO/G-6 1

UNCLASSIFIED Army CIO/G-6 Organization CIO / G-6 Deputy, CIO / G-6 LTG Robert Ferrell Mr. Gary Wang, SES Architecture, Operations, Networks & Space BG Randy Taylor Cyber Security LandWarNet Architecture Current Operations for OCO Guides Enterprise Information Environment Ms. Essye Miller, SES Army Architecture Integration Center Develops Enterprise Architecture Mr Gary Joint Information Environment Blohm, SES Army Cyber Strategy Information Assurance Cyber Emerging Technologies / R&D Testing, Evaluation, & Certification NETCOM DRU via Second Army DoDIN Operations Defensive Cyber Ops- Internal Defense Measures Policy and Resources Mr. Dean Pfoltzer, SES CW5 Derrick Edwards SGM Earl Allen Oversees Major IM / IT Programs in Policy & Governance Resource Integration & IT Budget Execution Policy Compliance Career Program 34 Management Enterprise Services Management MG John Morrison Mr. Daniel Bradford, SES CSM Stephfon Watson Command CW4 James Ebeler Other Key CIO/G6 Partners CIO/G-6 Special Staff Acting HR/MSD Mrs. Micki Bowman Aligns CIO/G-6 Strategic Goals & Strategies Strategic Communications and Events Staff and Congressional Actions Management Services of Human Resources, Manpower, Contracting, Audits, and Facilities May 14, 2015 SIG/ StratComm COL Jim Turinetti UNCLASSIFIED DRU 2

Cyber Security Directorate Information Assurance Policy (AR 25-2), Certification and Accreditation Federal Information Security Management (FISMA) Army Cross Domain Solutions (CDA) Office Privacy Impact Assessments (PIA) System of Systems Vulnerability Program Technology and Business Processes Army Commercial Mobile Program Information Security Continuous Monitoring (ISCM) Supply Chain Risk Management NetOps/Program Management Program Management Support NetOps/ Security Domain IA/Cyber Security Program Support and Management Interoperability, Acquisition, and Certification Program for System Interoperability Testing Infrastructure and Certification Acquisition Certification Process Coalition Interoperability Assurance Validation Program Integration and Training Manage and Coordinate Cyber Integration and Cyberspace initiatives IA/Cyber Security Risk Management Process IA Training and Certification Program Identity Management End to End Identity and Access Management Public Key Infrastructure COMSEC and COMSEC Modernization Key Management Infrastructure (KMI) Current Challenges The ability to transition from DIACAP to RMF with diversity of systems FISMA compliance (shortage of resources, leadership accountability) The ability to provide classified mobile device management (MDM) online Current Challenges Aligning civilian workforce roles with the military Career Field 17 structure Bridge Big Data efforts into the DCO program: Deploy Big Data Analytics platform Facilitating Army transition from Army Single Sign On (SSO) to Direct PKI or an enterprise directory service 3

Army Network Strategy Documents Army Network Campaign Plan 2020 and Beyond Links Army & DoD Strategies Describes network related end states at a high level and outlines the LOEs Implementation Guidance Near-Term (2015-2016) Describes activities in year of execution Reflects acquisition, resource and mission reality Guides design & development of the next network capability Implementation Guidance Mid-Term (2017-2021) Focuses on network capabilities Influences program resource planning within Program Objective Memorandum (POM) Army Cloud Strategy (Released 25 March 2015) Establish and communicate the Army s vision and approach for transitioning to a cloud-enabled network May 14, 2015 UNCLASSIFIED 4

Where We Need Your Help The Army Needs Technology Solutions that Extend From the Enterprise to the Foxhole Security / Cyber Cyber Workforce Development Cyber and Hacker Security Threat Solutions Data at Rest Security Software Identity Management/Access Management Software Security/Bandwidth Architecture Solutions (MPLS/JRSS/JMS) Management Software Configuration Compliance Checking Validated, Tested Applications Cloud Technologies Gov t Owned, Gov t Operated Gov t Owned, Commercial Operated Commercial Owned, Commercial Operated Applications Unified Capabilities (Voice, Video, IM/Chat, Presence, Awareness) Business Applications DoD/Army Applications Store Whitelist (Approved Applications) Commercial (ios & Android ) Energy Alternate Energy Supplies Reduced Power Requirements Lighter Battery Weights More Capability for the User Less Complex/More Intuitive for the User Hardware/Software Commonality & Interoperability Enterprise License Agreements Lighter More Agile Comms Innovative Bridges for Legacy to New Gaps 5

DoD and Army Small Business Offices "Small businesses are the backbone of our economy and the cornerstones of our communities. They create two of every three new jobs in America, spur economic growth, and spark new industries across the country. We will continue to create new incentives to help small business owners hire new workers, promote growth and do what America does best - invest in the creativity and imagination of our people. ~ Barack Obama, President of the United States Department of Defense Small Business Programs http://www.acq. osd.mil/osbp/ Defense Information Systems Agency http://www.disa.mil/a bout/our- Organization- Structure/OSBP Small Business Innovation Research and Small Business Technology Transfer http://www.sbir.gov/ Department of Army Small Business Programs http://www.selling toarmy.info/user/ showpage.aspx? SectionID=9 Army Contracting Command Small Business http://www.acc.army. mil/command-andstaff/staff/smallbusiness/ 6

Stay Connected!! 7