Network Operations (NetOps)



Similar documents
Mission Partner Concept

A Combat Support Agency

ARMY TRANSFORMATION: THE MOVE TO NET-CENTRIC WARFARE AND ENTERPRISE INFORMATION MANAGEMENT

A Comprehensive Cyber Compliance Model for Tactical Systems

Mission Oriented NetOps Situational Awareness. Mahmood Khan BMC Software Eric Howell BMC Software

Joint Information Environment Single Security Architecture (JIE SSA)

2014 Defense Health Information Technology Symposium Service Desk Strategy for the Defense Health Agency

Cyber Situational Awareness - Big Data Solution

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

US Army Network Security Reference Architecture

COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS, AND INFORMATION MANAGEMENT (C4IM) SERVICES LIST (UNCLASSIFIED FOUO)

Partnering with Small Business

Network Management and Defense Telos offers a full range of managed services for:

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

UNCLASS FORT GORDON GEORGIA CYBER REQUIREMENTS. MAJ Hurcules Murray TCM- CYBER DCO Chief 1 UNCLASS

DISA Testing Services for the Enterprise. Luanne Overstreet

Cybersecurity: The Defense Perspective

PRESIDIO MANAGED SERVICES OVERVIEW JULY 2013

Cyber Workforce Training

Infrastructure Development Forecast to Industry

Chief Review Services REVIEW OF DND/CF INFORMATION SECURITY. October (CRS) Canada

DoD s Strategic Mobility Vision: Needs & Challenges

Access FedVTE online at: fedvte.usalearning.gov

DoD IA Training Products, Tools Integration, and Operationalization

N e t w o r k E n g i n e e r Position Description

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Space Ground Services in the Joint Information Environment (JIE)

DISA Acquisition Opportunities

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE

7 th Signal Command Enterprise - Spiral 1. Concept of Operations 2012

Forecast to Industry 2015

An Overview of Large US Military Cybersecurity Organizations

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Forecast to Industry 2015 External Contracting Opportunities

How To Protect A Network From Attack From A Hacker (Hbss)

U.S. Army - Network Security Enterprise Reference Architecture

Altius IT Policy Collection Compliance and Standards Matrix

U.S. Army Network Operations Reference Architecture. (Aligned to the DOD Enterprise)

Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute

DISA and the Evolving DoD Enterprise

Army Service Level Management/Information Technology (IT) Metrics

Cloud Services Catalog with Epsilon

How To Improve The Defense Communications System

How To Implement Itil V3

DoD CIO ITSM Overview Enterprise Architecture Conference

Cloud-based web hosting consolidation with an IBM Drupal solution

STIGs,, SCAP and Data Metrics

Managed Services. Business Intelligence Solutions

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Service. Strategic Technology Solutions for DNA Technology Solutions and Services That Help You Optimize System Performance, Security and Availability

ICT Service Desk Team Leader. ICT Services Design Manager. Kings Way, South Melbourne. DATE: March 2015 ORGANISATIONAL ENVIRONMENT

Trusted Experience on Major Data Center Initiatives

DoD Cybersecurity Discipline Implementation Plan October 2015 Amended February 2016

TechNet Land Forces South Small Business Opportunities. Carey Webster Director, Federal Information Solutions Deltek

Operationally Focused CYBER Training Framework

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS K CH-63

INFORMATION TECHNOLOGY SERVICES IT SERVICES PORTFOLIO

IT Service Management in the JIE and the DoD Enterprise Service Management Framework

JOB DESCRIPTION QUESTIONNAIRE FOR SUPPORT STAFF

SCHEDULE M Security Services

LandWarNet Initial Capabilities Document NetOps Tools Convergence Strategy Update

Best Practices for Developing and Implementing the Right Monitoring Framework

How To Make A Theater Forest More Functional

Commercial Practices in IA Testing Panel

Defining a Secure Mobile Framework Architecture at DHA

Company Overview. Enterprise Cloud Solutions

1. Contracting Officer Representative (COR)

NETWORKING ENTERPRISE SPECIALIST VoIP Project (New position)

Request for Proposals (RFP) Managed Services, Help Desk and Engineering Support for Safer Foundation

SENIOR SYSTEMS ANALYST

Enterprise Governance and Planning

Army Telecommunications Division (ATD) Overview

How To Improve The Efficiency Of A Federal Student Aid Program

NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES

Service Automation to implement and operate your Cloud initiatives

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS H CH-63

Year 2 Objectives 1. Phase out old ticketing system. 2. Promote self service features to users.

Reliable, Repeatable, Measurable, Affordable

Department of Defense INSTRUCTION

HP and netforensics Security Information Management solutions. Business blueprint

Code of Practice for Cyber Security in the Built Environment

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Evaluating Internal and Outsourced Models for Network Monitoring

Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Remote Services. Managing Open Systems with Remote Services

Transcription:

Network Operations (NetOps) COL Debbie Theall Project Manager, PM I3C2 22 May 2013 UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 1 UNCLASSIFIED

Agenda UNCLASSIFIED Context NetOps Capabilities/Systems and Defensive Cyberspace Operations (DCO) NetOps Operational Construct Enterprise Service System as a Service (ESMSaaS) Army Enterprise Service Desk (AESD) Opportunities UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 2

Context UNCLASSIFIED U.S. Army NetOps capabilities have been generated, engineered, and procured in a decentralized manner across many commands and echelons Challenges: Disparate and non-interoperable systems/tools/configurations DOTMLPF material solution is getting ahead of the other components Doctrinal Disconnects: NetOps, Defensive Cyberspace Operations, DoD Information Network Operations (DoDIN), Joint Information Environment (JIE) CONOPS Multiple NetOps and Cyber Working Groups/IPTs Maintaining as is while moving to the to be Retrofitting the plane in flight The Army needs a more centralized approach to defining, validating, procuring, and fielding NetOps capabilities Currently looking at 25 NetOps systems to buy as a service or as a library of tools Working closely with the NetOps Trail Boss (PEO C3T) for strategic/tactical integration of capabilities for LandWarNet 2020 UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 3

NetOps Capabilities/Systems and Defensive Cyberspace Operations (DCO) IP Computing Platform Security Enterprise Support Enterprise Services & Application IP Network System (NetMan) 6+1 Host Based Security System (HBSS) 6+1 Network Access Control (NAC) Enterprise Services System (ESMS) 6+1 Database Element Manager Network Intrusion Prevention System (NIPS) Systems (SysMan) 6+1 IAVM IP Network Vulnerability Scanner 6+1 Domain Name Service (DNS) Directory Services Wireless Intrusion Prevention System (WIPS) Storage System Security Information System (SIMS) 6+1 IP Capacity, Availability, & Performance (CAP) Monitoring System Firewall Element Backup and Recovery Identity System Proxy Virtualization System (VSM) Crypto Security Router Element IAVM Computing Platform Switch Element Virtual Private Network (VPN) Deliver as a library of tools Deliver as a managed service More analysis required 6+1 6+1 Component (AD not shown) * NDAA 2011 Section 933 stipulates the requirement to provide cyber quick reaction capabilities (QRC) Wireless IP Network We must balance the value of best business practices that come with a managed service against cyber mission requirements. UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 4

Enterprise Service System as a Service (ESMSaaS) One Global Workflow (Ticketing) System for the Army ITSM as a managed service makes sense to keep up with technology changes, hardware lifecycles, and leverage best business practices from industry 18 RFI responses received and tracked last fall. Major outcomes: Establish and maintain a strong, aggressive project team The Army must define its CONOPS and requirements Start small and incrementally expand (phase) Use long-term contracts (7+ years) Establish a Single Award Indefinite Delivery / Indefinite Quantity (IDIQ) Out of the box solution with some constraints Stakeholder will need training and business process reengineering assistance IPT stood up by CIO/G-6 to pursue a disciplined approach to fielding ESMSaaS (and future NetOps tools/services) Hybrid of NDAA 2012 guidance with Business Capability Lifecycle (BCL) UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 5

Army Enterprise Service Desk (AESD) Current State AESD First Global Single-Point-of-Contact for IT Incidents One Help Desk (People) with different Ticketing Tools and Processes End User/IMO Tier 1 Workflow Support System Tier 2-3 Enterprise Services Incident Enterprise Applications Incident Functional Command Incident CONUS Theater Incidents For 30-40 Installations REPORTED BY PHONE CALL VERIZON 866-335-ARMY RIGHTNOWWEB SELF SERVICE TICKET EMAIL REPORTED BY PHONE CALL VERIZON 866-335-ARMY EMAIL ESD CSD HANDLED BY Tier 1 Triage agent Tier 1 Resolver agent OR REFERRED TO TIER 2 CONUS Enterprise DISA RightNowWeb Incident -Call -Web -Email Service Request Knowledge (Commercial RightAnswers, DISA Local Knowledge) Problem NETCOM ESMS Incident -Call -Email EMAIL Referral Ticket Situational Awareness Notification NETCOM ESMS Referral Ticket Situational Awareness Notification Tier 2-3 Resolvers ACOIC/ T-NOSCs NEC Tier 2 CT-NOSC UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 6

Strategic Look Ahead - Opportunities The Army will continue to expand use of AESD to provide Tier 0 and Tier 1 support for all enterprise services while in parallel working replacement of current AESD contract: AESD Request for Information (RFI) issued to industry 20 MAY Sources Sought announcement with FEDBIZOPS Solicitation Number: W52P1J-13-T-0414 Seeking innovative input from Contractors Experience operating Contact Centers supporting Government/multinational organizations Core competencies in configuring and maintaining Call Center supporting technologies Proven management and staffing approaches Leverage ESMSaaS to provide one global workflow (ticketing) system for the entire Army UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 7

UNCLASSIFIED N E T W O R K M O D E R N I Z A T I O N I N I T I A T I V E 8