Glenda Turner who is at the DoD and Network and Information Integration / Chief Information Officer of the Office of Assistant Secretary of Defense.
I had heard about ‘the killer brief culture’ of the pentagon and DoD. Most particularly from Thomas Barnett. This presentation was just so indicative of it. IT was a hodge-podge of different slides from different peoples ‘killer briefs’.
They are highlighted here on Flickr
Here is what I wrote down while she talked.
Network centric operations and warfare – Peacefair. “the next 15 years” how DoD is thinking and what is in progress to position information assurance.
- 55 major organizations (military departments)
- 4 million users
- 100,000 have significant with IA related responsibilities.
- Dataflows equivalent to the entire library of congress every 4 hours.
- 100 major networks
- 5000 major applications enabling critical military operations
- 22000 applications providing suport and infrastructure.
It is big business:
- 400 billion
- 30 billion IT and 2 billion in Information Assurance
Difference industrial space and hostile environments.
- Cooperative Engagement
- Family of Systems – Regional networks
- The Global Information Grid – Global internetwork for 21st Century.
Netcentricity this is a set of behaviour and how we conduct business
The quality of information and horizon…how far in the net you can see…
Make information avaliable on the network that people depend on and trust populate the network with new dynamic sources of informaiton
deny enemy advanatages and exploit weakness…
Sensor and Shooter + Command and control
Every sensor talks to every sensor…avaliable to all guns… put stress on net and information assurance.
We have been in the static mindest of control we are moving to dynamic mindset of enabling.
Global information environment is managed as a whole and develed.
Identity and access management are big topics here…
Entities dynamically discover adn freely interact with each other. They seamlessly acess everything they needs and concentrate ‘entities’ are a single device or person. Push envelope on identity and demands on this space for the global informaiton grid. Entities dynamically discover one another and interact. Set of objects and transactions. Information Assurance must get down to both level. Risk Adaptive – Dynamic Policy. Enforce confidentiality – through network boundaries. Manage by role or policy.
Aircraft carrier – 23 major networks. most driven by separation. We must
change the way we provision IT.
Capabilities based planning – enterprise IT portfolio Management.
Natioanl security strategy. USCOD 44 DoD Directive 8110.1
Enterprise IT. Investment management…
[my comment – Barfy graphics]. We buy information assurance.
Evaluation and prefformance management and outcomes based measurement…. this is going to be a huge growth area.
How do you judge different ways.
Informatoin Assurance becomes Information Technology.
Netcentric architechure – and war reference model.
Information assurance. SOA. Conforming to same rules everything else conforming to.