The Changing Face of Infrastructure and The Operational Agility Needed to Manage It Darrell Graddy, Vice President Mahesh Kalva, CTO Lockheed Martin Enterprise.

Slides:



Advertisements
Similar presentations
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Advertisements

Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
IaaS PaaS SaaS This is, in fact, the only risk to which we can lose the entire company. Chief Risk Manager.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Creating Value Through Innovation The Changing Face of Business Communications Simon Gwatkin VP Strategic Marketing Mitel July 16, 2008.
Minimising IT costs, maximising operational efficiency desktop.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
May l Washington, DC l Omni Shoreham SaaS Market Opportunities Jerry Champlin Chief Executive Officer Absolute Performance Inc. Enabling Today’s.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
EarthLink Business IT Services. EarthLink Business IT Services Snapshot Comprehensive IT services portfolio −Data center, virtualization, IT security,
Darren Strange Head of Environmental Sustainability Microsoft Ltd.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Solution Briefing Business Productivity in Action Keynote.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Effectively Explaining the Cloud to Your Colleagues.
Thriving in a Hybrid World Dean J. Marsh Vice President, Client Success IBM Analytic Solutions.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
The Virtualized Enterprise MORE FUNCTIONALITY AND REDUCED IT SPEND Speaker: Frank Grillo EVP of Marketing CYPRESS COMMUNICATIONS.
CHIEF EXECUTIVE OFFICER KoolSpan, The Trust Company.
SOLUTIONS FOR THE EFFICIENT ENTERPRISE Sameer Garde Country GM,India.
Dell Connected Security Solutions Simplify & unify.
An emerging computing paradigm where data and services reside in massively scalable data centers and can be ubiquitously accessed from any connected devices.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Richard Tworek VP, Enterprise Communication Servers 2006 Technology Focus Enhancing the Human Experience with Enterprise Real-Time and Secure Converged.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Akamai Technologies - Overview RSA ® Conference 2013.
Cyber Security Nevada Businesses Overview June, 2014.
October 29, 2009 From the Desktop to the Data Center Best Practices in Centralized Computing.
Consero Private & Confidential CLOUD COMPUTING “Plug & Work” IT Applications Finance & Accounting Outsourcing (FAO) 5/26/2011 Consero - High Performance.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Building Apps The Developer's Perspective Paradigm Shift = Opportunities Moving from apps at the enterprise Cloud Computing SaaS Model.
Desktop Virtualization Overview
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
Microsoft and Symantec
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Oct 2005 page 1 The CIO of the Future – Changing the Dialogue Rolf Kubli, EDS EMEA Architects Office, CTO EDS Switzerland EGEE04 Industry Forum.
Minimising IT costs, maximising operational efficiency IO and NIMM: Now is the time Glyn Knaresborough Director of Strategic Consulting.
Simplifying IT, Empowering Business.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Bill Fisher Security Engineer National.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Workshifting Transform your business – empower your people.
October 28, 2015 Cyber Security Awareness Update.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
© 2011 IBM Corporation IBM Cloud Computing Data en Cloud Computing Frank van der Wal, Technical Advocate.
Cybersecurity as a Business Differentiator
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Liza Lowery Massey President & CEO 1.
Cloud adoption NECOOST Advisory | June 2017.
Data Protection & Security
Secure & Unified Identity
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Healthcare Cloud Security Stack for Microsoft Azure
EIS Fast-track Revision Om Trivedi Enterprise Information Systems
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 21 March 2018.
Four Generations of Security Devices Putting IDS in Context
Securing the Threats of Tomorrow, Today.
Healthcare Cloud Security Stack for Microsoft Azure
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 26 September 2018.
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

The Changing Face of Infrastructure and The Operational Agility Needed to Manage It Darrell Graddy, Vice President Mahesh Kalva, CTO Lockheed Martin Enterprise IT & Data Solutions August 16, 2010

Why We are Here: An Executive Perspective  Background: NASA is experiencing a rapidly changing environment  Situation: IT Infrastructure and Operations »Facing Challenges/Opportunities »Demanding Results and Outcomes  Direction: Evolution of IT Infrastructure »Cloud Computing »Cyber Security »Mobile Technologies The Changing Face of Infrastructure —2— June 25, 2010

Challenges/ Opportunities Budget Pressures Innovation Cyber Security Green IT Telecommuting & Travel Industry Response Standardization and consolidation of IT services Creating Flexibility & Scalability through cloud computing Cyber Situational Awareness and Command and Control Virtualization & data de-duplication Mobile Workforce Solutions Technology Results Solutions-as-a-Service lowers costs & increases expandability Shifting from O&M fixed costs to variable costs Self Defense of the Enterprise from Cyber Attack Lower costs & compliance Secure remote computing Outcomes More budget for mission and research Secure Infrastructure Reduced carbon footprint Attracting and retaining talent & increased productivity Addressing NASA Challenges… The Changing Face of Infrastructure —3— June 25, 2010 … Through An Outcomes-Based Approach

Response to Budget Pressures Through Innovation: Cloud Computing INFRASTRUCTURE-AS-A-SERVICE (IAAS) Social Media FOIA PLATFORM-AS-A-SERVICE (PAAS) Grants Tools ITSM Data Solutions White Label Apps SECURITY Dashboard Logistics BILLING Solutions-as-a-Service More Budget for Mission and Research SOFTWARE-AS-A-SERVICE (SAAS) The Changing Face of Infrastructure —4— June 25, 2010

Cyber Security: More Important Than Ever 60% of all US Companies have been compromised -US Department of Justice ‘08 Report 60% of all US Companies have been compromised -US Department of Justice ‘08 Report 165% growth in new malicious code from ‘07 to ‘09 -Symantec 165% growth in new malicious code from ‘07 to ‘09 -Symantec 90% of all compromises can be stopped through proper configuration and patch management -Gartner 90% of all compromises can be stopped through proper configuration and patch management -Gartner 500% increase in ‘08 in the number of malware attacks that used hostile code to infiltrate or damage a computer system -- equal to the combined total for the five years prior - McAfee 500% increase in ‘08 in the number of malware attacks that used hostile code to infiltrate or damage a computer system -- equal to the combined total for the five years prior - McAfee Drives Need for End-to-End Cyber Situational Awareness and Command and Control to Self-Defend the Enterprise The Changing Face of Infrastructure —5— June 25, 2010

Telecommuting and Travel: Mobile Solutions Challenges Less control outside your network What’s lurking on home PCs? Less control outside your network What’s lurking on home PCs? Security Lost or stolen laptop = $50K to clean up Complexity of managing multiple devices Lost or stolen laptop = $50K to clean up Complexity of managing multiple devices Costs Incomplete access to data, specialized apps How do you create a true “home office?” Incomplete access to data, specialized apps How do you create a true “home office?” Productivity Entire Desktop on a Secure 3-inch Flash Drive The PC-on-a-Stick Solution Plug into just about any PC or laptop Carry the OS, data, apps in your pocket Plug into just about any PC or laptop Carry the OS, data, apps in your pocket MOBILE MOBILE 256-bit AES hardware encryption “White Listing” and Application Wrapping 256-bit AES hardware encryption “White Listing” and Application Wrapping SECURESECURE Heat, cold, water, sand resistant NIST FIPS Level 3 certified Heat, cold, water, sand resistant NIST FIPS Level 3 certified TOUGHTOUGH The Changing Face of Infrastructure —6— June 25, 2010

Getting There from Here: A Technologist Perspective The Changing Face of Infrastructure —7— June 25, 2010

Agency’s Network Cloud Computing: Infrastructure-as-a- Service… …Addressing Budget Pressures Through Innovation —8— June 25, 2010

Expressed Interest Public Impact LOW HIGH Technology Complexity Cost FOIA Manager Situational Landscape Health Terminology Management Grants Mgmt Data Visualization Call Center Management Broad solution targeted at a specific function Specialized solution targeted at specific activity or problem Low Complexity, Low Cost, High Interest, High Impact Low Complexity, Low Cost, Low Interest, Low Impact High Complexity, High Cost, High Interest, High Impact High Complexity, High Cost, Low Interest, Low Impact Asset Management Security-As-A- Service Compute-As- A-Service IT Service Mgmt Storage-As-A- Service Social Collaboration ERP Cloud Computing: Software-as-a-Service The Changing Face of Infrastructure —9— June 25, 2010 Logistics

Increasing Security Threats… Expanding Motivation Status * Economic * Military * Nation States * Politics * Globalization Expanding Motivation Status * Economic * Military * Nation States * Politics * Globalization Increased Sophistication of Players * Hackers * Organized Crime * Nation States Increasingly Targeted & Complex Attacks An Ever Increasing Challenge Due to Complexity of Attacks & What Is Being Attacked An Ever Increasing Challenge Due to Complexity of Attacks & What Is Being Attacked SOCIAL Engineering SOCIAL Engineering The Changing Face of Infrastructure —10— June 25, 2010

…Requires a New Approach to Defense Detect Deny Disrupt Degrade Deceive Reconnaissance Weaponization Delivery Exploit Compromise C2 Exfiltration Courses of Action Completeness = Resiliency Courses of Action Completeness = Resiliency Attack Defense Against the Cyber Kill Chain The Changing Face of Infrastructure —11— June 25, 2010

Innovations to Address Mobile Workforce On Travel Disaster Response In the Office Home PC On-A-Stick Mobility: Desktop Travels with You on a Flash Drive Tiered Security: Application White Listing and Wrappers, Hardware Encryption Enterprise Management: Complete Centralized Control PC On-A-Stick Mobility: Desktop Travels with You on a Flash Drive Tiered Security: Application White Listing and Wrappers, Hardware Encryption Enterprise Management: Complete Centralized Control The Changing Face of Infrastructure —12— June 25, 2010

Mobile Solutions  Incident Management – Aids Field Tech Investigation, Diagnosis, Resolution, Problem ID Expert Help Knowledge Base Access Rich Capture  Asset Management – Integration with scanner technology By year-end 2010, 1.2 billion people will carry handsets capable of rich, mobile commerce providing a rich environment for the convergence of mobility and the Web (Gartner) By 2012, 70% of all workers will be mobile and 90% of all enterprises will develop at least one mobile application (Forrester & IDC) By year-end 2010, 1.2 billion people will carry handsets capable of rich, mobile commerce providing a rich environment for the convergence of mobility and the Web (Gartner) By 2012, 70% of all workers will be mobile and 90% of all enterprises will develop at least one mobile application (Forrester & IDC) The Changing Face of Infrastructure —13— June 25, 2010

Summary: Outcomes for NASA More Budget for Mission and Research Secure Infrastructure Reduced Carbon Footprint Attracting and Retaining Talent & Increased Productivity The Changing Face of Infrastructure —14— June 25, 2010