SlideShare a Scribd company logo
1 of 12
Download to read offline
CAPT Christopher Page, USN
Deputy Director, Assured Command & Control Division
OPNAV N2/N6F1
Unclassified
20140507
2UNCLASSIFIED
Information Dominance
3
“Operational advantage gained from fully
integrating information functions, capabilities
and resources to optimize decision making
and maximize warfighting effects.”
Accomplished by 3 core capabilities:
 Assuring C2
 Maintaining Battlespace Awareness
 Integrating Fires
Delivering Warfighting Effects!
UNCLASSIFIED
4
Satellites and Tactical Datalinks
Correlate, decide, disseminate in all environments
Electromagnetic
Spectrum
C3 PlatformsTools
Afloat and Ashore Networks
Unclassified
 Warfighter’s Assured C2 Perspective
– Data Availability
– Data Integrity
– Data Confidentiality
 Adversary’s Perspective
– The above present exploitable attack vectors
 Must identify attack vectors, map materiel solutions and develop
appropriate policy and Tactics, Techniques, and Procedures (TTP)
 Must be addressed in a comprehensive, end-to-end architecture
– Individually addressing Availability, Integrity and/or Confidentiality
will not “Assure C2”
5
Agile policy underpins a comprehensive end to end architecture
 Assured communications architecture despite the full range of
adversary actions, environment impacts, and EM Spectrum dynamics
 There is no Silver Bullet
– Asymmetric Space and Cyber threats require an architectural response
– Includes: Transport, Networks, Policy, Applications
 New Concept of Operations (CONOPS) and TTP
– Fleet will fight with significantly less network access
 Joint, Interagency, and Coalition interoperability are paramount
 Austere budget environment demands better decision-making, greater
agility, stronger partnerships with service providers
6
Our greatest capabilities can become our greatest vulnerabilities
 Bolster Nuclear Command, Control, and Communications (NC3)
capabilities for Navy and the Nation
 Implement Joint Information Environment (JIE) and Intelligence
Community Information Technology Enterprise (IC ITE)
 Execute named Cyber Remediation campaign across Navy’s end-to-
end Information Dominance Enterprise Architecture (IDEA)
 Finalize Technology Transition Agreement (TTA) for integrating
Naval Tactical Cloud (NTC) into Agile Core Services (ACS)
 Mature Assured C2 Integrated Readiness Assessment (IRA) and IT
Baseline Assessment Memorandum (BAM)
 Manage Assured C2 Programs of Record across the ashore, afloat,
and aloft segments of the IDEA
7
CANES – CONSOLIDATED AFLOAT NETWORKS AND ENTERPRISE SERVICE
 Consolidate multiple afloat networks:
– Provide secure, reliable common hosting for multiple C4I applications
– Provide integrated voice, video, data and system management
– Single, scalable IT platform that will enable Assured C2
8
Today:
Tactical Data Link (TDL)
EM Spectrum Awareness
Tomorrow:
9
Navy Marine
Corps Intranet Continuity of Service Contract
Next Generation
Enterprise Network
OCONUS Navy Enterprise Network
JIE = Joint Information Environment
Navy
Information
Environment
Sensitive Compartmented Information Networks
IC ITE = Intel Community IT Enterprise
CANES
10
NGEN, CANES, DCC are keys to success -- aligned to JIE
Next Generation Enterprise
Network (NGEN)
Data Center Consolidation (DCC)
Consolidated Afloat
Networks and Enterprise
Services (CANES)
 Ensure commander’s ability to command assigned forces in any
environment
 Assured EM spectrum access in high-threat scenarios to
transport, share, store, protect and disseminate critical data
 “Operationalization” of the EM spectrum and cyberspace into a
warfighting domain
Enable use of the EM spectrum as maneuver space.
11
Assured
C2
Battlespace
Awareness
Integrated
Fires
Assured EM Spectrum - Pathway to Navy Information Dominance
 Assured C2 sets conditions for Navy commanders to maintain the IT-
enabled ability to exercise C2 authorities across the sea, land, air, space,
and cyberspace domains in heavily contested or denied operating
conditions.
 Navy must continue to clearly define and manage capability-based Assured
C2 requirements and resources, and align those requirements and
resources with JIE/IC ITE through the IDEA
 The primary beneficiaries of the effort to deliver Assured C2 capabilities are
the requirements stakeholders: USFF, USPACFLT, and USFLTCYBERCOM
subordinate commanders who execute Navy’s warfighting mission in all
domains.
12
Assuring C2 for Information Dominance

More Related Content

Viewers also liked

The Five Essential Truths of the Application Economy
The Five Essential Truths of the Application EconomyThe Five Essential Truths of the Application Economy
The Five Essential Truths of the Application EconomyCA Technologies
 
IT Certifications that Pay Well - And Why to Consider CloudMASTER
IT Certifications that Pay Well - And Why to Consider CloudMASTERIT Certifications that Pay Well - And Why to Consider CloudMASTER
IT Certifications that Pay Well - And Why to Consider CloudMASTERCarver Technology Consulting LLC
 
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...Dana Gardner
 
CloudOpen 2014 - Mixing Your Open Source Cloud Cocktail
CloudOpen 2014 - Mixing Your Open Source Cloud CocktailCloudOpen 2014 - Mixing Your Open Source Cloud Cocktail
CloudOpen 2014 - Mixing Your Open Source Cloud CocktailMark Hinkle
 
Infographic - The True Cost of Downtime
Infographic - The True Cost of DowntimeInfographic - The True Cost of Downtime
Infographic - The True Cost of DowntimeAppDynamics
 
Deep Organisational Transformation a model for a higher Agility
Deep Organisational Transformation a model for a higher AgilityDeep Organisational Transformation a model for a higher Agility
Deep Organisational Transformation a model for a higher AgilityAndreas Prins
 
Converged IoT Systems: Bringing the Data Center to the Edge of Everything
Converged IoT Systems: Bringing the Data Center to the Edge of EverythingConverged IoT Systems: Bringing the Data Center to the Edge of Everything
Converged IoT Systems: Bringing the Data Center to the Edge of EverythingDana Gardner
 
Summit 2014 Keynote
Summit 2014 KeynoteSummit 2014 Keynote
Summit 2014 KeynoteAtlassian
 
DevOps and Continuous Delivery reference architectures for Docker
DevOps and Continuous Delivery reference architectures for DockerDevOps and Continuous Delivery reference architectures for Docker
DevOps and Continuous Delivery reference architectures for DockerSonatype
 
Grafana is not enough: DIY user interfaces for Prometheus
Grafana is not enough: DIY user interfaces for PrometheusGrafana is not enough: DIY user interfaces for Prometheus
Grafana is not enough: DIY user interfaces for PrometheusWeaveworks
 

Viewers also liked (13)

The Five Essential Truths of the Application Economy
The Five Essential Truths of the Application EconomyThe Five Essential Truths of the Application Economy
The Five Essential Truths of the Application Economy
 
IT Certifications that Pay Well - And Why to Consider CloudMASTER
IT Certifications that Pay Well - And Why to Consider CloudMASTERIT Certifications that Pay Well - And Why to Consider CloudMASTER
IT Certifications that Pay Well - And Why to Consider CloudMASTER
 
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
 
CloudOpen 2014 - Mixing Your Open Source Cloud Cocktail
CloudOpen 2014 - Mixing Your Open Source Cloud CocktailCloudOpen 2014 - Mixing Your Open Source Cloud Cocktail
CloudOpen 2014 - Mixing Your Open Source Cloud Cocktail
 
Infographic - The True Cost of Downtime
Infographic - The True Cost of DowntimeInfographic - The True Cost of Downtime
Infographic - The True Cost of Downtime
 
Lean Security
Lean SecurityLean Security
Lean Security
 
Deep Organisational Transformation a model for a higher Agility
Deep Organisational Transformation a model for a higher AgilityDeep Organisational Transformation a model for a higher Agility
Deep Organisational Transformation a model for a higher Agility
 
Converged IoT Systems: Bringing the Data Center to the Edge of Everything
Converged IoT Systems: Bringing the Data Center to the Edge of EverythingConverged IoT Systems: Bringing the Data Center to the Edge of Everything
Converged IoT Systems: Bringing the Data Center to the Edge of Everything
 
Summit 2014 Keynote
Summit 2014 KeynoteSummit 2014 Keynote
Summit 2014 Keynote
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
DevOps and Continuous Delivery reference architectures for Docker
DevOps and Continuous Delivery reference architectures for DockerDevOps and Continuous Delivery reference architectures for Docker
DevOps and Continuous Delivery reference architectures for Docker
 
Grafana is not enough: DIY user interfaces for Prometheus
Grafana is not enough: DIY user interfaces for PrometheusGrafana is not enough: DIY user interfaces for Prometheus
Grafana is not enough: DIY user interfaces for Prometheus
 
NAVFAC Conference Briefing
NAVFAC Conference BriefingNAVFAC Conference Briefing
NAVFAC Conference Briefing
 

Similar to @AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page

White Paper: Enhanced Mission Effectiveness through Improved Connectivity
White Paper: Enhanced Mission Effectiveness through Improved ConnectivityWhite Paper: Enhanced Mission Effectiveness through Improved Connectivity
White Paper: Enhanced Mission Effectiveness through Improved ConnectivityHelene Savvidis
 
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Adil Khan
 
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...AFCEA International
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...AFCEA International
 
Dunkle resume Info tech spec2
Dunkle resume Info tech spec2Dunkle resume Info tech spec2
Dunkle resume Info tech spec2david dunkle
 
NDIA_NEN_27 Sep 2022_FINAL.pdf
NDIA_NEN_27 Sep 2022_FINAL.pdfNDIA_NEN_27 Sep 2022_FINAL.pdf
NDIA_NEN_27 Sep 2022_FINAL.pdfPEODigital
 
Software technologies in defence ppt
Software technologies in defence pptSoftware technologies in defence ppt
Software technologies in defence pptSantosh Kumar
 
softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdf
softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdfsoftwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdf
softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdfCHANDANBISHT33
 
Thornton_Test-Tech
Thornton_Test-TechThornton_Test-Tech
Thornton_Test-TechBen Thornton
 
NATO Federated Mission Networking
NATO Federated Mission NetworkingNATO Federated Mission Networking
NATO Federated Mission NetworkingJohn Palfreyman
 
Donald Corliss - SM TM
Donald Corliss - SM TMDonald Corliss - SM TM
Donald Corliss - SM TMDonnie Corliss
 
Jaime D Lujan_24Sept15
Jaime D Lujan_24Sept15Jaime D Lujan_24Sept15
Jaime D Lujan_24Sept15Jaime Lujan
 
Resume - Ragadio_Jeveck
Resume - Ragadio_JeveckResume - Ragadio_Jeveck
Resume - Ragadio_JeveckJeveck Ragadio
 
Commscope Federal Solutions Paper.PDF
Commscope Federal Solutions Paper.PDFCommscope Federal Solutions Paper.PDF
Commscope Federal Solutions Paper.PDFKevin LeVan
 
CW3 WRIGHT RESUME.docx1.docx2
CW3 WRIGHT RESUME.docx1.docx2CW3 WRIGHT RESUME.docx1.docx2
CW3 WRIGHT RESUME.docx1.docx2chris wright
 
Signal Commandant Presentation: TechNet Augusta 2015
Signal Commandant Presentation: TechNet Augusta 2015Signal Commandant Presentation: TechNet Augusta 2015
Signal Commandant Presentation: TechNet Augusta 2015AFCEA International
 
Michael Egan Resume
Michael Egan ResumeMichael Egan Resume
Michael Egan ResumeMichael Egan
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresMohammed Saqib
 
Resume Weber Elijah
Resume Weber ElijahResume Weber Elijah
Resume Weber ElijahElijah Weber
 

Similar to @AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page (20)

White Paper: Enhanced Mission Effectiveness through Improved Connectivity
White Paper: Enhanced Mission Effectiveness through Improved ConnectivityWhite Paper: Enhanced Mission Effectiveness through Improved Connectivity
White Paper: Enhanced Mission Effectiveness through Improved Connectivity
 
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)
 
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
 
Dunkle resume Info tech spec2
Dunkle resume Info tech spec2Dunkle resume Info tech spec2
Dunkle resume Info tech spec2
 
NDIA_NEN_27 Sep 2022_FINAL.pdf
NDIA_NEN_27 Sep 2022_FINAL.pdfNDIA_NEN_27 Sep 2022_FINAL.pdf
NDIA_NEN_27 Sep 2022_FINAL.pdf
 
Software technologies in defence ppt
Software technologies in defence pptSoftware technologies in defence ppt
Software technologies in defence ppt
 
softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdf
softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdfsoftwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdf
softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdf
 
Thornton_Test-Tech
Thornton_Test-TechThornton_Test-Tech
Thornton_Test-Tech
 
NATO Federated Mission Networking
NATO Federated Mission NetworkingNATO Federated Mission Networking
NATO Federated Mission Networking
 
Donald Corliss - SM TM
Donald Corliss - SM TMDonald Corliss - SM TM
Donald Corliss - SM TM
 
Jaime D Lujan_24Sept15
Jaime D Lujan_24Sept15Jaime D Lujan_24Sept15
Jaime D Lujan_24Sept15
 
Resume - Ragadio_Jeveck
Resume - Ragadio_JeveckResume - Ragadio_Jeveck
Resume - Ragadio_Jeveck
 
Commscope Federal Solutions Paper.PDF
Commscope Federal Solutions Paper.PDFCommscope Federal Solutions Paper.PDF
Commscope Federal Solutions Paper.PDF
 
CW3 WRIGHT RESUME.docx1.docx2
CW3 WRIGHT RESUME.docx1.docx2CW3 WRIGHT RESUME.docx1.docx2
CW3 WRIGHT RESUME.docx1.docx2
 
Military Defense Solutions Overview
Military Defense Solutions OverviewMilitary Defense Solutions Overview
Military Defense Solutions Overview
 
Signal Commandant Presentation: TechNet Augusta 2015
Signal Commandant Presentation: TechNet Augusta 2015Signal Commandant Presentation: TechNet Augusta 2015
Signal Commandant Presentation: TechNet Augusta 2015
 
Michael Egan Resume
Michael Egan ResumeMichael Egan Resume
Michael Egan Resume
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
Resume Weber Elijah
Resume Weber ElijahResume Weber Elijah
Resume Weber Elijah
 

More from GovCloud Network

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmarkGovCloud Network
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for meGovCloud Network
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeGovCloud Network
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in CyberspaceGovCloud Network
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessGovCloud Network
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)GovCloud Network
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefGovCloud Network
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013GovCloud Network
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013GovCloud Network
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 
Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013GovCloud Network
 
Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...GovCloud Network
 
Texas Dept of Information Resources Agency Strategic Plan
Texas Dept of Information Resources Agency Strategic PlanTexas Dept of Information Resources Agency Strategic Plan
Texas Dept of Information Resources Agency Strategic PlanGovCloud Network
 
Gravitant Whitepaper Cloud for Federal Govt
Gravitant Whitepaper Cloud for Federal GovtGravitant Whitepaper Cloud for Federal Govt
Gravitant Whitepaper Cloud for Federal GovtGovCloud Network
 

More from GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 
Cloud computing-made-easy
Cloud computing-made-easyCloud computing-made-easy
Cloud computing-made-easy
 
Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013
 
Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...
 
Texas Dept of Information Resources Agency Strategic Plan
Texas Dept of Information Resources Agency Strategic PlanTexas Dept of Information Resources Agency Strategic Plan
Texas Dept of Information Resources Agency Strategic Plan
 
Gravitant Whitepaper Cloud for Federal Govt
Gravitant Whitepaper Cloud for Federal GovtGravitant Whitepaper Cloud for Federal Govt
Gravitant Whitepaper Cloud for Federal Govt
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 

@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page

  • 1. CAPT Christopher Page, USN Deputy Director, Assured Command & Control Division OPNAV N2/N6F1 Unclassified 20140507
  • 3. Information Dominance 3 “Operational advantage gained from fully integrating information functions, capabilities and resources to optimize decision making and maximize warfighting effects.” Accomplished by 3 core capabilities:  Assuring C2  Maintaining Battlespace Awareness  Integrating Fires Delivering Warfighting Effects! UNCLASSIFIED
  • 4. 4 Satellites and Tactical Datalinks Correlate, decide, disseminate in all environments Electromagnetic Spectrum C3 PlatformsTools Afloat and Ashore Networks Unclassified
  • 5.  Warfighter’s Assured C2 Perspective – Data Availability – Data Integrity – Data Confidentiality  Adversary’s Perspective – The above present exploitable attack vectors  Must identify attack vectors, map materiel solutions and develop appropriate policy and Tactics, Techniques, and Procedures (TTP)  Must be addressed in a comprehensive, end-to-end architecture – Individually addressing Availability, Integrity and/or Confidentiality will not “Assure C2” 5 Agile policy underpins a comprehensive end to end architecture
  • 6.  Assured communications architecture despite the full range of adversary actions, environment impacts, and EM Spectrum dynamics  There is no Silver Bullet – Asymmetric Space and Cyber threats require an architectural response – Includes: Transport, Networks, Policy, Applications  New Concept of Operations (CONOPS) and TTP – Fleet will fight with significantly less network access  Joint, Interagency, and Coalition interoperability are paramount  Austere budget environment demands better decision-making, greater agility, stronger partnerships with service providers 6 Our greatest capabilities can become our greatest vulnerabilities
  • 7.  Bolster Nuclear Command, Control, and Communications (NC3) capabilities for Navy and the Nation  Implement Joint Information Environment (JIE) and Intelligence Community Information Technology Enterprise (IC ITE)  Execute named Cyber Remediation campaign across Navy’s end-to- end Information Dominance Enterprise Architecture (IDEA)  Finalize Technology Transition Agreement (TTA) for integrating Naval Tactical Cloud (NTC) into Agile Core Services (ACS)  Mature Assured C2 Integrated Readiness Assessment (IRA) and IT Baseline Assessment Memorandum (BAM)  Manage Assured C2 Programs of Record across the ashore, afloat, and aloft segments of the IDEA 7
  • 8. CANES – CONSOLIDATED AFLOAT NETWORKS AND ENTERPRISE SERVICE  Consolidate multiple afloat networks: – Provide secure, reliable common hosting for multiple C4I applications – Provide integrated voice, video, data and system management – Single, scalable IT platform that will enable Assured C2 8 Today: Tactical Data Link (TDL) EM Spectrum Awareness Tomorrow:
  • 9. 9 Navy Marine Corps Intranet Continuity of Service Contract Next Generation Enterprise Network OCONUS Navy Enterprise Network JIE = Joint Information Environment Navy Information Environment Sensitive Compartmented Information Networks IC ITE = Intel Community IT Enterprise
  • 10. CANES 10 NGEN, CANES, DCC are keys to success -- aligned to JIE Next Generation Enterprise Network (NGEN) Data Center Consolidation (DCC) Consolidated Afloat Networks and Enterprise Services (CANES)
  • 11.  Ensure commander’s ability to command assigned forces in any environment  Assured EM spectrum access in high-threat scenarios to transport, share, store, protect and disseminate critical data  “Operationalization” of the EM spectrum and cyberspace into a warfighting domain Enable use of the EM spectrum as maneuver space. 11 Assured C2 Battlespace Awareness Integrated Fires Assured EM Spectrum - Pathway to Navy Information Dominance
  • 12.  Assured C2 sets conditions for Navy commanders to maintain the IT- enabled ability to exercise C2 authorities across the sea, land, air, space, and cyberspace domains in heavily contested or denied operating conditions.  Navy must continue to clearly define and manage capability-based Assured C2 requirements and resources, and align those requirements and resources with JIE/IC ITE through the IDEA  The primary beneficiaries of the effort to deliver Assured C2 capabilities are the requirements stakeholders: USFF, USPACFLT, and USFLTCYBERCOM subordinate commanders who execute Navy’s warfighting mission in all domains. 12 Assuring C2 for Information Dominance