Information Technology Laboratory (ITL) - Strategic Planning Update - Cita Furlani, Director

Similar documents
SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Big Data R&D Initiative

Analysis One Code Desc. Transaction Amount. Fiscal Period

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

The Application Readiness Level Metric

CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21)

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

Enterprise Capabilities Descriptions

HHSN W 1 QSSI - Quality Software Services, Inc

How To Write A Book On Risk Management

Accenture Cyber Security Transformation. October 2015

The Keyed-Hash Message Authentication Code (HMAC)

NIST Cloud Computing Program Activities

Study Regulations for the Master Course Visual Computing

NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing

GSA FIPS 201 Evaluation Program

High Performance Computing Initiatives

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

NIST Cyber Security Activities

Ocean Class AGOR Program Acquisition Status. Prepared by PEO Ships, PMS325Q For UNOLS Annual meeting 13 October 2009

GTA Board of Directors September 4, 2014

National Institute of Standards and Technology

Identity, Credential, and Access Management. Open Solutions for Open Government

USP Strategic Planning and Initiatives

Software Development: The Waterfall Model

CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

Depth and Excluded Courses

Hardware Enabled Zero Day Protection

APPLICATION ANNUAL WORK PLAN (ONE OBJECTIVE PER PAGE)

CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) $100,070,000 -$32,350,000 / %

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

IST639 Enterprise Technologies Course Syllabus Spring 2014

LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY. 1st TERM (14 SEPT - 27 NOV)

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

Science Gateways in the US. Nancy Wilkins-Diehr

Basic Project Management & Planning

Army Regulation Product Assurance. Army Quality Program. Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED

Other Required Courses (14-18 hours)

Gilead Clinical Operations Risk Management Program

Program Management Professional (PgMP) Examination Content Outline

Human Dimension in Cyber Operations Research and Development Priorities

NAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE. Venu Govindaraju

Sarah A. Rajala Ernest W. & Mary Ann Deavenport, Jr. Chair and Dean Bagley College of Engineering Mississippi State University Mississippi State, MS

MEng, BSc Applied Computer Science

OPTIMIZING THE USE OF VHA s FEE BASIS CLAIMS SYSTEM (FBCS)

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses

STUDENT ASSESSMENT TESTING CALENDAR

An Introduction to the. Society Program Portfolio Management Process

Cyber Security Research and Development: A Homeland Security Perspective

Overview of how to test a. Business Continuity Plan

Nuclear Regulatory Commission Computer Security Office CSO Office Instruction

SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)

Department of Information Systems and Cyber Security

Division of Behavioral and Cognitive Sciences STRATEGIC PLAN

NIST Cybersecurity Framework. ARC World Industry Forum 2014

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Coordination and air quality monitoring during emergencies. Colin Powlesland Environment Agency

Ernest F. Hollings Undergraduate Scholarship Program 2016 Online Application Instructions

Columbia NUS. Double Professional Degree in Financial Engineering. Guillermo Gallego Columbia University

SYSTEMS, CONTROL AND MECHATRONICS

RISK ASSESSMENT OF DISTRIBUTION SYSTEM: REAL CASE APPLICATION OF VALUE AT RISK METRICS

GOVERNMENT USE OF MOBILE TECHNOLOGY

GEOSPATIAL LINE OF BUSINESS PROGRAM MANAGEMENT OFFICE CONCEPT OF OPERATIONS

NASA OFFICE OF INSPECTOR GENERAL

One Hundred Thirteenth Congress of the United States of America

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Agile enterprise content management and the IBM Information Agenda.

Highlights & Next Steps

ICD-10 Training and Preparation The Road to ICD-10 April 23, 2015

How To Get A Computer Science Degree At Appalachian State

COURSE CATALOG. BS Networking and System Administration

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

Enterprise Projects Fiscal Year 2011/2012 Third Quarter Report

Transcription:

Information Technology Laboratory (ITL) - Strategic Planning Update - Cita Furlani, Director 1

Strategy Why? NIST Mission: To promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve the quality of life. President Bush: Tonight I announce an American Competitiveness Initiative, to encourage innovation throughout our economy First, I propose to double the federal commitment to the most critical basic research programs To play a proactive role in the future of the United States, we need to KNOW that we are doing the right things and doing things right 2

Strategic Process (1) Weekly Discussion Topics: STRS Projects (Prioritized) OA Projects Mandated projects Project tracking/management Organizational Structure Core competencies Organizational drivers Metrics 100-Day Deliverable : Tactical plan to implement organizational change (programmatic and structural) and strategic process Strategic Implementation Groups Jan 2 Mar 30-31 Apr 14 Management Offsite: Define organizational structure Programmatic outline 3

ITL Core Competencies IT Measurement and Testing Examples: conformance test development, cryptographic module validation, human language processing, security testing Sample Projects: CMVP, Text REtrieval Conference, interactive systems technology, software test method research Technology Development Mathematical and Statistical Analysis for Measurement Science Examples: Bayesian analysis, deconvolution methods, nonlinear approximations, uncertainty analysis, immersive visualization, numerical analysis of partial differential equations Sample Projects: fundamental statistical metrology, statistical metrology education, high performance visualization, image analysis Modeling and Simulation for Measurement Science Examples: Modeling of physical, chemical, biological, and information systems, network modeling, stochastic modeling Sample Projects: high performance computing, complex systems, modeling of mechanical systems and processes, trustworthy networking Customers IT Standards Development and Deployment Examples: computer security standards, communications protocols, internetworking protocols, voting standards, web standards Sample Projects: usability and accessibility of voting systems, personal identity verification (PIV), biometric standards, multimedia standards, IPv6, math knowledge management 4

Program Portfolio Programs are the Intersection of ITL Core Competencies and Program Drivers Trust and Confidence in IT Systems and Applications Trustworthy Computing Trustworthy Software Trustworthy Networking Cyber Security Identity Management Management and Exploitation of Data Complex Data Sets Information Sharing Future Information Systems Complex Systems Pervasive Info Systems/Ubiquitous Computing IT in Science and Engineering Enabling Scientific Discovery Virtual measurement Systems Interdisciplinary Incubation IT for Emerging Technologies 5

Strategic Process (2) Strategic Implementation Groups (SIGs) scope programs, relate to drivers, broad opportunities Management Decision Select FY07 Programs Start Selected Programs May 18 June 15 Mid July Oct 1 6

Heilmeier Questions (NSF Version) What are we trying to do? What is the problem we're trying to solve? How is it done today, and what are the limitations of current practice? What is new in our approach / technology, and why do we think it will be successful? What gives evidence that it will work? Assuming we are successful, what difference does it make? How long will it take, how much will it cost, and what are (measurable) milestones, mid-term and final exams? And always Why NIST? 7