NATO CIS Symposium Sofia 18 Oct 06 Adam Boothby Director Strategic Development Europe

Slides:



Advertisements
Similar presentations
Achievement of CIS Interoperability – NATO Policy and Processes
Advertisements

Building open regional innovation strategies: New opportunities provided by Smart Specialisation Strategies Claire Nauwelaers Independent STI policy expert.
© 2009 The MITRE Corporation. All rights Reserved. Evolutionary Strategies for the Development of a SOA-Enabled USMC Enterprise Mohamed Hussein, Ph.D.
Applying the SOA RA Utah Public Safety ESB Project Utah Department of Technology Services April 10, 2008 Prepared by Robert Woolley.
Presenters:Donald McCalman Sandy Gilchrist 1 st Sept 2008.
Building an Operational Enterprise Architecture and Service Oriented Architecture Best Practices Presented by: Ajay Budhraja Copyright 2006 Ajay Budhraja,
Distribution Statement A: Approved for Public Release; Distribution is unlimited. 1 Electronic Warfare Information Operations 29 MAR 2011 Val O’Brien.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Oncor’s EIM Program.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialC Enterprise Architecture and the Architect.
NATO Network Enabled Capabilities
ISS IT Assessment Framework
IT Governance and Management
IT Planning.
CFUW National AGM 2015 Moving CFUW into the 21 st Century.
Managing the Information Technology Resource Course Introduction.
High-Level Assessment Month Year
The topics addressed in this briefing include:
Investment Management Concepts Portfolio Management | Segment Architecture March 25, 2009 Adrienne Walker and Kshemendra Paul
Privileged and Confidential Strategic Approach to Asset Management Presented to October Urban Water Council Regional Seminar.
Getting Smarter with Information An Information Agenda Approach
SharePoint Governance Success Getting Started with Governance CalSPUG Edition Presented by Sag Baruss Published January.2014 Version 1.7.
© Rheinmetall Defence 2013 The Geospatial Catalogue and Database Repository (GCDR) and the Knowledge Management System (KMS) Shane Reschke – Technical.
Dynamic IT for the Dynamic Enterprise Creating the Next Generation of Business-Responsive IT Frank Gens SVP Research IDC.
FirstEnergy / Jersey Central Power & Light Integrated Distributed Energy Resources (IDER) Joseph Waligorski FirstEnergy Grid-InterOp 2009 Denver, CO November.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
The Challenge of IT-Business Alignment
© 2008 Mercury Computer Systems, Inc. Converged Sensor Network Architecture (CSNA) Dr. Ian Dunn, Michael Desrochers, Robert Cooper – Mercury.
NIEM Domain Awareness June 2011 Establishing a Domain within NIEM.
Riva Managed Identity Integration for Active Directory and Novell ® GroupWise ® Aldo Zanoni CEO, Managing Director Omni Technology Solutions
Eurostat Forthcoming EU support to African capacity building for statistical production Pieter Everaers, Eurostat, Director of Cooperation in the European.
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
Why Governance? SOA Governance allows to n Master complexity of IT n Support business process change.
Training for a Network Enabled Capability
EPA Geospatial Segment United States Environmental Protection Agency Office of Environmental Information Enterprise Architecture Program Segment Architecture.
Network-Enabled Platforms – Tools to Maximize Operational Performance.
Assessing the Military Benefits of NEC Using a Generic Kill-Chain Approach David Nevell QinetiQ Malvern 21 ISMOR September 2004.
Enterprise Architecture HOW COMPANIES ARE EXPLOITING INFORMATION TO THROUGH IT.
CONNECTING YOU TO THE AUTHORITATIVE GEO-INFORMATION FRAMEWORK FOR EUROPE Copyright ©2013 EuroGeographics A new Strategy for EuroGeographics.
C4ISR for the Military: Development and Implementation Presentation to the Security Network’s C4ISR, Robot Platforms, and Sensor Conference Greg Collins,
© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National.
1 Earth Science Technology Office The Earth Science (ES) Vision: An intelligent Web of Sensors IGARSS 2002 Paper 02_06_08:20 Eduardo Torres-Martinez –
Proventures reconnect session on Project Portfolio Management (PPM)
Secure Virtual Enclaves February 4, 2000 Deborah Shands, Richard Yee Jay Jacobs, E. John Sebes.
Kathy Corbiere Service Delivery and Performance Commission
1 Power to the Edge Agility Focus and Convergence Adapting C2 to the 21 st Century presented to the Focus, Agility and Convergence Team Inaugural Meeting.
JNTC Joint Management Office
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Joint Program Executive Office for Chemical and Biological Defense
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
19-20 October 2010 IT Directors’ Group meeting 1 Item 6 of the agenda ISA programme Pascal JACQUES Unit B2 - Methodology/Research Local Informatics Security.
Protecting Against Cyber Challenges Pacific Operational Science & Technology Conference 15 March 2011 Rob Wolborsky Chief Technology Officer Space and.
Aligning Business Process Architecture and Enterprise Architecture: A Model Driven - Service Oriented Approach Chris Capadouca Business Solutions Architect.
HIGH LEVEL ADVOCACY FORUM ON STATISTICS : The Urgency of Statistics and the Global Crisis Enabling Development in the Caribbean Community PORT-OF SPAIN,
Network Centric Planning ---- Campaign of Experimentation Program of Research IAMWG Dr. David S. Alberts September 2005.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Telephone : +234 (0) | Website : Registered company : Telephone : +234.
Michael J. Novak ASQ Section 0511 Meeting, February 8, 2017
Patrick Gorman Assistant Head Architecture Framework
Brussels Delegation Meeting in Sapir
Objectives Reduction of Implementation and Maintenance Expenditure on SharePoint Ecosystem Keeping the SharePoint Ecosystem aligned with Modern Technology.
Establishing Strategic Process Roadmaps
COE as a Service An eUnomia Factory Solution.
The Process Owner is the Secret Agent!
NDIA Targets, UAVs and Range Operations
The People Ready Vision for Business in the Enterprise
Defence Strategic Support Management
Presentation transcript:

NATO CIS Symposium Sofia 18 Oct 06 Adam Boothby Director Strategic Development Europe

Prosecuting Difficult Targets

Time Sensitive Targeting  The problem-space  Threat profile  Politics  Weapons  The solution-space  Enabling technology  Coalition operations 

TRIDENT WARRIOR Architecture

TRIDENT WARRIOR – HEADLINE LESSONS  Large Joint and Combined ISTAR networks at high maturity  Networks better than stovepipes  Commanders can have actionable target data in low order timescales  Target resolution is highly accurate  Networks find what single platforms miss

HOWEVER….KEY ISSUES  Conceptual  Security  Architectures  Procurement processes

CONCEPTS  Aligning Concepts and TTPs  Policies  Rules of Engagement  Inter-Service issues  Sequencing network assets with tactical events  Networks have an optimal configuration  Geometry  Electro-magnetic coverage  Time Its not about the technology…stupid!

SECURITY  Security is on critical path  Security gatekeepers need to recognise strategies such as NEC  Long lead times  Strategic to tactical domains  TSTs = JFC priority targets The desire to share…

ARCHITECTURES “An architect is the drawer of dreams…” Grace McGarvie  Turning Dreams into Capability  Focus on operational Analysis  Bring work strands together  Project managers role  Service Orientation  Business processes  Solution not a concept  Central role  Technology road-maps  Standards and protocols Virtual Communication Path (Dynamic Path Creation) Target ID Service Network Configuration Control Electronic Picture Compilation Mission Management Correlation & Data Fusion Mission Monitoring Collection Steerage (retask) Synchronisation Collaborative Mission Planning System protection Distributed Database Meta-Data Catalogue GMTIIMINTHUMINTAMTIOSCINTMASINTELINT

Procurement Processes  Spiral Acquisition  Proof  Financial straight jacket  Reciprocal altruism  Newtonian cause and effect vs organic modification  Approvals processes  Balancing experimentation with exploitation  Appropriate sovereignty

What next?  Portfolio manage existing programmes  Be more financially transparent  Stop talking about SOA until we have defined what is meant by it  Align coalition business processes  Architectures  Use as a business tool  Understand how to fight as a network  Exploit already mature technologies

Time Sensitive Targeting  Additional and expanded target set available to the Commander  Robust C2 procedures required  Rupert Smith’s vision of ‘ …fighting amongst the people…’  Precision  Timeliness  Decision-making  Future balance between time-sensitive and routine targets  Does EBO make everything a TST?  Why drop a bridge until you need to?  Event triggers effect