1 SPOT-On Contracting: Improving Transparency and Contractor Personnel Monitoring in Contingency Operations Breakout Session # F11 Collin Swan The George.

Slides:



Advertisements
Similar presentations
IT Works so Uwork(s): Letting Technology work for You!!!
Advertisements

How Will it Help Me Do My Job?
Proprietary Information EMERGING TECHNOLOGIES. Proprietary Information PLANNING TECHNOLOGY, INC. (PTI)  Airport specialists developing customized software.
Contractor Assurance System AC Overview October 13, 2009.
A presentation on e-Procurement
9 th Annual Public Health Finance Roundtable November 3, 2012 Boston, MA Peggy Honoré.
Session B: How do we manage heterogeneous networks including those at the tactical edge? Session Facilitator: Bruce Patterson Principal Network Systems.
Effective Coordination of Multiple Intelligent Agents for Command and Control The Robotics Institute Carnegie Mellon University PI: Katia Sycara
Contractor Assurance Discussion Forrestal Building Washington, D.C. December 14, 2011.
Centers for IBM e-Business Innovation :: Chicago © 2005 IBM Corporation IBM Project October 2005.
By Saurabh Sardesai October 2014.
Sharepoint 2007  An integrated suite of server capabilities can help improve organizational effectiveness by providing various processes.  Provides.
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
A Safety Management System (SMS) is: “A systematic approach to managing safety, including the necessary organizational structures, accountabilities,
1 IT Security Awareness, Training and Education Trends Dan Costello Policy Analyst OMB.
Justice Information Network Strategic Plan Development Justice Information Network Board March 18, 2008 Mo West, JIN Program Manager.
1 Contractors on the Battlefield Mr. Gary Motsek Assistant Deputy Secretary of Defense (Program Support) November 12, 2009.
November 17, Critical Risk Identification System (CRIS) United States Department of Agriculture Office of Homeland Security & Emergency Coordination.
Maureen B. Higgins Assistant Director, Agency Support & Technical Assistance Office of Personnel Management December 8, 2010.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
Overview… Three core areas: Policy / Process, Automated Contractor Management Tool, and Execution / Boots on the Ground Synchronized Predeployment & Operational.
ShopKeeper was designed from the ground up to manage your entire fleet maintenance operations … from 1 user to 100, including full security features that.
Powered by An overview of the WorkSource Integrated Technology Solution for WEC.
Designing Active Directory for Security
Monitoring Internal Control Systems Johann Rieser Senior Auditor, Ministry of Finance, Vienna.
Review of NWS IT Consolidation Efforts For HIC Meeting July 2006 Tom Schwein Team Leader of Desktop Management Tiger Team SOD CRH.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
George A. Godding, Jr. Director, Management and Communications Office of Market Oversight and Investigations Comments are the speakers and do not necessarily.
Fiscal Transparency at Local Level Baki Kerimoğlu 7 June 2005, ISTANBUL.
UNITED STATES POSTAL INSPECTION SERVICE J. J. Rowan Acting Chief Postal Inspector MTAC May 16, 2002.
APAN Group Owner Training. APAN Groups Overview FOUO PII Other types Information Categories Aggregate data impacts OPSEC Group Owner Responsibilities.
Department of the Navy Information Security Program
INEE MS Contextualization Juba, South Sudan 6-9 March, 2012.
1 The Future of Financial Management in the Public Service Rocky J. Dwyer, PhD, CMA.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Experience you can trust. 1 Commercial Demand-Side Management Internet Applications Date: 2004.
Enhancing Institutional Capacities for Urban Management Vinod Tewari Director National Institute of Urban Affairs
Strategies for Knowledge Management Success SCP Best Practices Showcase March 18, 2004.
ECOTRADE AN ECOWAS ICT INITIATIVE TOWARDS GREATER TRADE FACILITATION A Presentation Of : The ECOWAS Computer Centre, Abuja, NIGERIA.
Ensuring Conformance & Interoperability NHIN Testing Leslie Power, NHIN Testing Lead (Contractor) Office of the National Coordinator for Health IT WEDNESDAY,
1 Amy Williams, Senior Procurement Analyst March 25, 2008 Defense Acquisition Regulations System
NSLDS Overview Current Status and Considerations for the Future Tuesday April 24, 2007, 2:30 pm 3:30 pm.
Recommendations on Monitoring and Tracking Quantity and Quality of Climate Expenditure, Accountability and Transparency Group 5.
RAPT RFID based Asset and Personnel Tracker Team 24.
PROTECTING THE INTERESTS OF CONSUMERS OF FINANCIAL SERVICES Role of Supervisory Authorities Keynote Address to the FinCoNet Open Meeting 22 April 2016.
A full life-cycle BD pipeline management application for federal contractors.
1 Services Contracting in the DoD: An Empirical Analysis of the Use of a Project Management Approach Breakout Session # D14 Dr. Rene G. Rendon, CFCM,
Vanguard For Army Transformation PM BCT 1 Predicting What the Future Holds Risk Management PM Brigade Combat Team.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Copyright © 2008 Pearson Education, inc. or its affiliates. All rights reserved. Welcome to PearsonAccess Session Two Administrative Functions.
SCOC NYS Compliance with the JJDPA 1. Core Requirements DSO Separation Jail Removal 2.
1 The Top Ten Tools Every Subcontract Manager Needs Breakout Session # A15 Name: Jim W. Kirlin Date: July 30, 2012 Time: 11:15 a.m. – 12:30 p.m.
Unlinking Private Data
Group policy.
Role Responsibilities
Society for Maintenance and Reliability Professionals (SMRP)
Audit Trail LIS 4776 Advanced Health Informatics Week 14
Techno-commercial Training on CWM, VAM and JPC
Information Technology Sector
Synchronized Predeployment Operational Tracker (SPOT)
Synchronized Predeployment Operational Tracker (SPOT)
Supplier Information Session Safeguarding Covered Defense Information and Cyber Incident Reporting, DFARS August 16, 2016 Christian Ortego.
ONRR Compliance Process Improvement
Enterprise Program Management Office
Presentation to Project Certification Committee, DoIT August 24, 2008
Work and Service Supervisor
Session 11: Finance Function
Presentation transcript:

1 SPOT-On Contracting: Improving Transparency and Contractor Personnel Monitoring in Contingency Operations Breakout Session # F11 Collin Swan The George Washington University Law School 2012 W. Gregor MacFarlan Excellence in Contract Management Research & Writing Program Tuesday, July 31, 4:00 PM – 5:15 PM

2 The Synchronized Pre-Deployment & Operational Tracker (“SPOT”) Interagency Web-Based System Purpose: –Authorize Deployment to Contingency Areas –Track Personnel Movement and Activities DOD, State, & USAID

3 Tracking Contractors in Contingency Operations Omnipresence of Contractors –Outnumber troops –Performing more (and more important) tasks Monitoring Difficulties –Ineffective oversight controls –“Twenty-thousand-piece jigsaw puzzle”

4 Transparency & Responsible Delegation Increases Public Participation Enhances Democratic Values Ensures Responsible Delegation Improves Accountability Transparency = Flow of Information

5 Diffusion of Responsibility

6 The Role of Technology Increased Data Processing Capabilities –Centralize, Standardize, Disseminate Willingness of Users is Critical Success Story: the B-2 Spirit “Stealth” Bomber

7 SPOT as a Monitoring Tool NDAA Fiscal Year 2008 –DOD, State, USAID SPOT Information Categories –Contract Data –Contractor Personnel SPOT Reporting Capabilities (not very robust)

8 SPOT Contract Info Screen

9 SPOT Personnel Info Screen

10 Centralize Data Through SPOT

11 Areas of Concern 1)Information Accessibility 2)Interagency Coordination 3)Capturing Information on Local Nationals 4)Security Risks

12 Improving Information Accessibility Query Functions & Reporting Capabilities List Information by Company –Contracts Held –Personnel Employed Clearly Identify Security Personnel

13 Enhancing Interagency Coordination Utilize SPOT Consistently –Uniform Reporting Requirements Link to Other Contract Databases –FPDS-NG –FAPIIS Improve Information Sharing!!

14 Capturing Reliable Information on Local Nationals SPOT-Generated Identification Cards –Similar to Letters of Authorization (LOAs) Cultural Factors & Internet Connectivity Issues

15 Alleviating Security Concerns with Using SPOT Use of SPOT by State & USAID –Perceived NGO Association with U.S. Military Cybersecurity Concerns –DOD  Cyberspace is an “Operational Domain” –Enhance Safeguarding Requirements

16 Suggestions welcome: Questions?