PL ALTESS Application Modernization and Risk Management Framework Services Presented By: Scott Friend Chad Vance.

Slides:



Advertisements
Similar presentations
Enterprise Performance Life Cycle (EPLC) Stage Gate Reviews
Advertisements

Course: e-Governance Project Lifecycle Day 1
JUNE 2007 page 1 EDS Proprietary Applications Modernization Services Modernizing the Applications Portfolio.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Software Quality Assurance Plan
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
ITIL: Service Transition
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information Assurance (IA) - Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication,
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Overarching Roles of Critical Partners In A Project 9:30 – 10:00 Rob Curlee, FMO Joseph Dominque, OCISO Mike Perry, EA.
ISS IT Assessment Framework
1 Samples The following slides are provided as samples and references for the Quarterly Reviews Additional slides will be added.
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Stephen S. Yau CSE , Fall Security Strategies.
Risk Management Framework
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
Engineering, Operations & Technology | Information TechnologyAPEX | 1 Copyright © 2009 Boeing. All rights reserved. Architecture Concept UG D- DOC UG D-
NIST Special Publication Revision 1
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
The Challenge of IT-Business Alignment
Roles and Responsibilities
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
SCSC 311 Information Systems: hardware and software.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
Relationships July 9, Producers and Consumers SERI - Relationships Session 1.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
U.S. Department of Agriculture eGovernment Program July 9, 2003 eAuthentication Initiative Update for the eGovernment Working Group eGovernment Program.
Verification and Validation — An OSD Perspective — Fred Myers Deputy Director, Test Infrastructure Test Resource Management Center November 4, 2009.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
Information Technology Assessment Findings Presented to the colleges of the State Center Community College District.
ITIL ♥ PM ITIL and Project Management: Friends Throughout the Lifecycle.
Implementing Program Management Standards at Duke Energy.
Collaborating for Quality Quality Assurance (QA) & Quality Control (QC) in the Accelerator Project (ACCSYS) Matthew Conlon ACCSYS QA/QC
Environment, Safety, and Occupational Health Opportunities in DoD Business Transformation May 4, 2006.
Enterprise Solution Services Assessing the IT environment Oversaw 2014 Texas Legacy System Study report (HB 2738, 83R) Identified 4,130 business applications.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
DoD Template for Application of TLCSM and PBL
ITIL: Service Transition
Supportability Design Considerations
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Hyper-V Cloud Proof of Concept Kickoff Meeting <Customer Name>
Description of Revision
Phase 3 Tollgate Review Discussion Template
INCOSE – North Texas Chapter
Program Management Overview
Phase 3 Tollgate Review Discussion Template
IT Development Initiative: Status and Next Steps
Phase 1 Tollgate Review Discussion Template
Phase 3 Tollgate Review Discussion Template
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Corporate Overview.
Continuity Guidance Circular Webinar
IT Transformation: Strategic Plan & Pilot Public Education Department
Capabilities Briefing
IT Management Services Infrastructure Services
{Project Name} Organizational Chart, Roles and Responsibilities
EXECUTIVE OVERVIEW “Your Systems, Our Knowledge”
SHARE Special Project Enterprise Learning Management Pilot Project Planning/Implementation Certification December 17, 2014 Requesting Agency: Cassandra.
Presentation transcript:

PL ALTESS Application Modernization and Risk Management Framework Services Presented By: Scott Friend Chad Vance

FOUO 2 A Premier IT Service Provider IT Services Platform We deliver powerful, multi-faceted computing infrastructure, configured to support a global user-base. Our infrastructure serves as the primary mechanism for computing and data storage services available to the Department of Defense and other authorized users. Capability Delivery and Application Modernization We provide world-class information technology services, refactoring, repurposing, and consolidation of legacy applications and systems to align with your business needs. We support new service delivery models, Enterprise Services and Applications, and Component Services and Applications for all mission areas. Cyber Defense We provide enterprise-class physical security and cybersecurity environments for assured protection and federal compliance. Our cybersecurity services are designed to meet and exceed the minimum security as outlined by the Department of Defense and National Institute of Standards in Technology. Standardized Processes We implement standardized operations and processes to meet your critical delivery requirements. Our processes ensure customer engagement, graceful failover, disaster recovery, continuity of operations, service and capability delivery, and load balancing.

Legacy modernization, or software modernization, refers to the conversion, rewriting or porting of a legacy system to a modern computer programming language, software libraries, protocols, and/or compute resources. Modernization options include re-platforming, re-hosting, re-coding, re-architecting, re-engineering, interoperability, replacement and retirement, as well as changes to the application architecture to clarify which option should be selected. Application Modernization Defined 3FOUO

Modernization Tiers FOUO4 Foundational Focus on data collection Interface with Application Owners Define the “As-Is” capability Compile the Technical Modernization Requirements Estimate Costs and LOE Strategic Focus on in-depth modernization activities to align more closely with current business needs. Re-platforming, re-hosting, recoding, re-architecting, re- engineering, interoperability, replacement and retirement. Transitional Focus on compliancy and standardization Perform risk assessment scanning & reporting Perform Application & OE Assessment Provide remediation recommendations Provide Modernization / Migration Cost Estimate Impliment modernization for compliancy and security

Application Assessment Perform vulnerability, IA, and application assessment and provide recommendations for remediation. OE Assessment Review system requirements and provide engineering assessment/recommendations to “right size” the architecture Reassessment Reassess the application once the remediation is complete Technical Assessment Package Gather required system information and develop Technical Assessment Package Remediation Remediate findings in order to meet compliancy and OE standards Migration Ready ALTESS provides a full suite of IT Services for remediation, staging, Cybersecurity, and business management to modernize and maintain in a migration ready state. Application Modernization / Migration Services FOUO 5

Applications follow a Software Development Life Cycle (SDLC) process using an agile approach to ensure standardization, expedite delivery, and manage requirements creep. Application Migration/Management Framework Requirements Definition Security Review Design / Recommendations Remediation Modernization (If Necessary) Quality Assurance Testing Sustain Applications in Ready State User Acceptance Testing FOUO PlanningImplementationSustainment 6

7 Service Level Management – Key to Customer Success Service Level Management is the foundation of a suite of standard processes designed to ensure customer success The Service Level Manager is the voice of the customer and manages services across teams and providers to ensure successful deployment of cloud ready applications The Service Level Manager can coordinate a complete offering of Cloud Support Services Requirements Management Project ManagementChange ManagementRelease ManagementDeployment Cloud Support Services FOUO

Requirements Development Logical Analysis Architectural Design Implementation Integration Verification Transition Validation ALTESS Technical Management Processes Requirements ManagementConfiguration ManagementTechnical Assessment Interface ManagementTechnical Data ManagementDecision Analysis Risk ManagementTechnical Planning ALTESS Technical Management Processes Requirements ManagementConfiguration ManagementTechnical Assessment Interface ManagementTechnical Data ManagementDecision Analysis Risk ManagementTechnical Planning Systems Engineering Services Aligns with Defense Acquisition Guidebook and ISO/IEC 15288:2008 Systems and software engineering -- System life cycle processes CDR SFR PDR SVR TRR SFR – System Functional Review PDR – Preliminary Design Review CDR – Critical Design Review TRR – Test Readiness Review SVR – System Verification Review PlanningImplementationSustainment FOUO 8

PL ALTESS provides enterprise-class physical security and cybersecurity environments for assured protection and federal compliance. Our cybersecurity services are designed to meet and exceed the minimum security as outlined by the Department of Defense and National Institute of Standards in Technology. Foundational cybersecurity services Customer impact review and assessment of Acceptable Use Policies, Non-Disclosure Agreements, change requests, system documentation, and new or updated DoD/Army regulation Coordination of recovery efforts for classified spillages and Personally Identifiable Information or other security incidents Cybersecurity Services 9FOUO

RMF Support Services Provide Cybersecurity Engineering Services to mitigate risk and maintain the security posture of mission systems and applications Ensure customers’ systems incorporate proper security measures Provide technical management of assessment and authorization continuously throughout the life cycle Oversee incorporation of information assurance vulnerability management Detail in Plan of Action and Milestones (POA&Ms) all necessary security actions and issues Ensure the actions and issues of the POA&Ms are addressed on schedule Cybersecurity Services for RMF 10FOUO

11 Contact Us For more information please contact: LTC Toy Frasier, Jr. Acting Product Lead Scott Friend Acting Deputy Chad Vance Chief, Applications Services Division ALTESS Service Desk:

QUESTIONS? FOUO 12

BACKUP FOUO 13

Application Modernization Environment Remediate Modernize Stage ALTESS AAMBO Oversight Relationship Management Reporting Migrat e Asse ss FOUO14

Modernization Tiers FOUO15 Army Migration Business Office (AAMBO) Interface with Application Owners Facilitate the Migration / Modernization process Compile the Technical Assessment Package Provide initial ROM for CBA Service Provider Selection Report Metrics PL ALTESS Execute risk assessment scanning & reporting Report findings and provide remediation services Provide Staging environment for modernization activities Provide modernization services and support migration Conduct Post-Modernization Technical Validation Provide Modernization / Migration Cost Estimate