Chief, ARSTAF Cyberspace Task Force

Slides:



Advertisements
Similar presentations
Creating the Map To Set the Direction. Educational Positioning System (EPS – a play on GPS)
Advertisements

Marc Grégoire, DRDC Ottawa Luc Beaudoin, Bologik Inc.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Establishing Cyber Security education, awareness, training and trust for SMEs Roger Dean, Executive Director
January 2006 BusinessObjects User Group Meetings 1 University of Michigan Administrative Information Services Business Intelligence Plans and Activities.
Armed Forces Communications & Electronics Association (AFCEA) Presentation Brief United States Army Signal Network Enterprise Center “Mission, Technology,
DHS, National Cyber Security Division Overview
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
IT Project Management Office
Keystone Technology Plan Presentation to Chesapeake Bay Program Information Management Subcommittee May 19, 2004 Nancie L. Imler Chief Information Officer.
Sharepoint 2007  An integrated suite of server capabilities can help improve organizational effectiveness by providing various processes.  Provides.
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
KM enhances mission command, facilitates the exchange of knowledge, supports doctrine development, fosters leaders’ development, supports lessons learned,
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Wednesday 10 June 2015 Carrie Marr Executive Director Organisational Effectiveness WSLHD Mobilising People and Leading Sustainable Change.
N A T I O N A L A S S O C I A T I O N O F C O N S E R V A T I O N D I S T R I C T S.
Your Financial Work Defense Finance and Accounting Service DFAS Transformation Update March 2003.
16 October 2007 Focus and Convergence Challenges for Complexity Science List of Candidate Topics Focus and Convergence Challenges for Complexity Sciences.
Virginia Local Government IT Executives (VALGITE) April 26, 2010 Bruce Sturk & Leslie Fuentes – City of Hampton.
ASME Strategic Plan FY Strategic Plan Overview Page 2 Mission & Vision: What we want to be and why we exist Core Values: What we believe in and.
IT Acquisitions from the Risk Manager’s Perspective Jeffrey Posluns, CRMP,CGEIT, CISM, CISSP-ISSMP Chairman Governance Risk Compliance Security International.
Divisional Chief Executives Supported by Divisional Risk Committees Executive Committee Group Chief Executive Group Functions Group Finance Director Group.
MPE – Enabling ALL to securely SEE, DECIDE, ACT MPE - Highlights  Establish Core Implementation Working Group  Build Joining, Membership, and Exiting.
The Commonwealth Has a “VOICCE” Virginia’s Operational Integration Cyber Center of Excellence.
Defense Daily Cyber Summit
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
 Local commanders understand impact of IA on mission accomplishment  Standard allies and coalition partners can emulate  IA for other workforces (acquisition,
UNCLASSIFIED / FOR OFFICIAL USE ONLY USAFMCOM UNCLASSIFIED / FOR OFFICIAL USE ONLY.
Protecting Against Cyber Challenges Pacific Operational Science & Technology Conference 15 March 2011 Rob Wolborsky Chief Technology Officer Space and.
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
2016 Supplier Diversity Campus Conversation INSPIRE. INNOVATE. IMPACT. Darryl A. Peal, Executive Director Office for Business and Community Economic Development.
Establishing (or Enhancing) PMO Effectiveness Nicolle Goldman, PMP March 28, 2007.
June 23, 2016 Organizational Overview. 2 Automation Federation Background A fragmented community of automation professional associations and societies.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Air Force Leadership.
JMFIP Financial Management Conference
Mgt Project Portfolio Management and the PMO Module 8 - Fundamentals of the Program Management Office Dr. Alan C. Maltz Howe School of Technology.
Quantum Leap Project Management
Head of Library, Networked Services and Student Support
BruinTech Vendor Meet & Greet December 3, 2015
Utilizing Your Business Continuity Plan.
Why KM is Important KM enhances mission command, facilitates the exchange of knowledge, supports doctrine development, fosters leaders’ development, supports.
“Existing world order is being redefined.” Henry Kissinger Jan 2015
and Security Management: ISO 28000
Governors Homeland Security and All-Hazards Cyber Security Sub-Committee April 19th, 2016.
Information Technology Sector
IPv6 within the Australian Government
Building Better IT Leaders from the Bottom Up
Improving Mission Effectiveness By Exploiting the Command’s Implementation Of the DoD Enterprise Services Management Framework - DESMF in the [name the.
Cyberspace Operations / SIGINT / EW Integration Update Mad Scientist "The 2050 Cyber Army" Conference BG(P) Patricia Frost Director of Cyber, Office.
CIO G-6 Signal Conference
Transforming IT Management
8 Building Blocks of National Cyber Strategies
Managing Change and Other Keys to Successful Implementation
Cyber Center of Excellence
Contractor Assurance Systems (CAS) Summit August 23, 2016
Good governance Helping to deliver better public services for citizens
By Jeff Burklo, Director
One Voice Central Texas Presentation to CAN Board
= Collaborative Planning + The Balancing Act
LREC Management Office (LRECMO)
Cybersecurity ATD technical
Steering Committee Brief to the DoD M&S Conference 2008
Agenda Purpose for Project Goals & Objectives Project Process & Status Common Themes Outcomes & Deliverables Next steps.
Ms. Kristyn E. Jones Director, Financial Information Management
Presentation transcript:

Chief, ARSTAF Cyberspace Task Force 15 April 2009 BG Steven Smith Chief, ARSTAF Cyberspace Task Force

Integrated Security Cyber Security – Enterprise Approach Centralized Enhance the Army’s Cyber Security posture through extensive knowledge sharing, collaboration, compliance standardization and situational awareness Integrate Information Assurance and Computer Network Defense efforts at an Enterprise level Improve the ARSTAF Cyberspace Task Force’s ability to provide oversight to all Army Cyber initiatives Facilitate the capability to develop and track the Army’s Cyber Warriors by close collaboration with TRADOC, FORSCOM, SIGCEN and HRC Collaborate with AGNOSC to create an initial SIPRNET DKO-S Cyber Dashboard that gives Army senior leadership a visible snapshot status of Key Cyber and Information Assurance status by command Facilitate standardized Cyber Security products and processes across HQDA Cyber Security – Enterprise Approach Effective Enterprise Cyber Security Leverages: Enterprise Collaboration People Processes Technology Increased Response Effectiveness Enterprise Directorate Visibility is Provided Strengthened Security Posture Enterprise Dashboard Enterprise Standardization Centralized Vision & Steering Key Objective: Establish and use an Enterprise-wide risk management approach that increases LandWarNet cyber security defense by allowing decision makers to effectively balance risk cost with mission benefits 15 May 2009 America's Army: The Strength of the Nation – Army Strong

Situational Awareness is good…really …told you so 

America's Army: The Strength of the Nation – Army Strong Challenges Vulnerability of critical infrastructures Banking, Finance, etc. Impact on military operations Adversaries are well trained and equipped Users are our greatest vulnerability…they are attacked 24/7 Risks posed by foreign interests/ownership of tools we purchase Need for cyber professionals Deep technical skills that cross all cyber elements Understand how to incorporate cyber operations into the deliberate planning process 15 May 2009 America's Army: The Strength of the Nation – Army Strong

Event: DD Mmmm YYYY steven.smith13@us.army.mil Briefer: