SlideShare a Scribd company logo
1 of 9
4/20/2017
May 26, 2015
Mission Partner Environment
Information System (MPE-IS)
“Globally integrated operations, increasing the overall adaptability of the
force to cope with uncertainty, complexity and rapid change.” JF2020
4/20/2017
Sharing Information with Mission Partners
2
4/20/2017
Background
• Capstone Concept for Joint Operations (CCJO): Joint Force 2020, 28
September 2012
“In this concept, Joint Force elements, globally postured, combine quickly
with each other and mission partners to integrate capabilities fluidly across
domains, echelons, geographic boundaries, and organizational affiliations.”
• CJCS JIE White Paper, 22 January 2013
“JIE is critically important to achieving this vision”
• DOD CIO, December 2014:
“Let’s Accelerate MPE…”
• 15-Star Memo to DOD CIO:
“…Single MPE to be fully operational by FY16…”
4/20/2017
MPE-IS
SEC/REL Cloud
Bottom-line Up Front (BLUF)
• MPE-IS globally postures the Joint Force to swiftly form, evolve, dissolve and
reform information-sharing environments across DOD and mission partners
• MPE-IS simplifies and standardizes information sharing through virtualization
technologies
– Transitioning from physical to virtual capabilities
enables rapid mission network creation
– Standardization reduces hardware, software
and labor costs to stand-up new mission networks
– A shared suite of core services (e.g., email, chat, voice, VTC, etc.)
– Provides a standardized suite of cybersecurity defense
• MPE-IS aligns mission partner sharing to a common capability
– Capitalizes and/or recapitalizes on existing mission partner systems and
initiatives
– Aligns with NATO’s Federated Mission Networking (FMN) capabilities
– All Commercial Off-the-Shelf products
4
MPE-IS: The Future of C2 Networking
5
• Physically Separate Resources
(Compute, Storage, & Network)
• Variations in Software, Hardware, Security, etc.
• No License or Infrastructure Sharing
• Manually Intensive
• Low Agility
• Private Cloud Architecture
• Mission Enclave networks are virtualized
• Application Pooled Licenses across enclaves
• Compute resources shared across enclaves
• Storage resources pooled across enclaves
• High Agility
Current C2 Networks
MPE-IS Cloud
(Multiple Enclaves)
Shared MPE-IS
MPE-IS SEC/REL Domain Vision
Today: Regional & Physical
– SIPRNET
– Independent
– Non-Standard Baselines
– Mixed Security
– Manual Federations
– Type I Encryption Only
– Labor-Intensive Standup
– Thick Clients Only
6
FY18-24: Global & Virtual
– Off-SIPRNET
– Robust “Shared” Service Suite &
Automated Federations
– Standardized E2E Baseline
– Approved Security
– On-Demand Provisioning
– CSfC with Some Type 1
– “Global” Fight-Tonight Capability
Across All Domains
– “Zero, Thin, MEC, & Mobile”
Clients
FY16-18: Regional & Virtual
– Off-SIPRNET
– “Shared” Basic Services & Manual
Federations
– Standardized Virtual Data Center Baseline
– Approved Security
– Partial Automated Provisioning
– Type 1 w/ Commercial Solutions for
Classified (CSfC)
– “Regional” Fight-Tonight SEC/REL
– Migration to “Zero, Thin, Multi-Enclave
Client (MEC)”
FY16: Email w/attachments, Chat, Voice, VTC, ISR (FMV), COP, Web/File Share, GAL, Office Automation, Print,
Classification Tool (Available now)
FY17+: OMS and Language Translation (Available Aug 17)
MPE-IS Target Architecture
Single MPE-IS Node
7
MPE-IS Virtual Data Center
MPE-IS Contingency Capacity
MPE-IS Mission Enclave - F
VDI
Mission Specific Services
Core Services (Email, Chat, VTC, VOIP)
Support Services (ITSM, Office OA, Print)
US Provided
US
User
Mission
Partner
User
US
User
Mission
Partner
Cross Domain
Services
MPE-IS Mission Enclave - B
Mission Specific Services
Core Services (Email, Chat, VTC, VOIP)
Support Services (ITSM Office OA, Print)
MPE-IS Mission Enclave – A
Mission Specific Services
Core Services (Email, Chat, VTC, VOIP)
Support Services (ITSM office, OA, Print)
US BICES-X MAC - D
Core Services (Email, Chat, VTC, VOIP)
US BICES-X MAC - C
Core Services (Email, Chat, VTC, VOIP)
C2, Logistics,
Weather, etc
US
BICES
US
SIPR
US BICES-X: TNE
CD Transfer
Services
(chat, email)
MLS File
Share
MPGW-X
MPE-IS Mission Enclave - E
VDI
Mission Specific Services
Core Services (Email, Chat, VTC, VOIP)
Support Services (ITSM, Office OA, Print)
Mission
Partner
Support Services
Support Services
US
User
Mission
Partner User
VDI
VDI
Mission
Partner
Thin, Thick, or Zero
MEC, Thin, Thick,
or Zero
Thin, Thick, or Zero
Thin, Thick, or Zero
Thin, Thick, or Zero
MEC, Thin, Thick, or Zero
MEC, Thin, Thick, or Zero
MEC, Thin, Thick, or Zero
CMNT with
CFSC and
Type 1
MPGW-X
• Global Resiliency (COOP)
• Can Accommodate
More than C2 (e.g. ISR)
4/20/2017
Next Steps
• Test MPE-IS Capabilities
• Manage MPE-IS Development and Builds
• Continue System Maturity
• Rationalize and Converge Legacy Systems
• Expand and Increase Commercialization
8
4/20/2017
Questions?
9

More Related Content

What's hot

PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Cloud Adoption Framework - Overview_partner.pptx
Cloud Adoption Framework - Overview_partner.pptxCloud Adoption Framework - Overview_partner.pptx
Cloud Adoption Framework - Overview_partner.pptxabhishek22611
 
On-premise to Microsoft Azure Cloud Migration.
 On-premise to Microsoft Azure Cloud Migration. On-premise to Microsoft Azure Cloud Migration.
On-premise to Microsoft Azure Cloud Migration.Emtec Inc.
 
IT Strategy Framework
IT Strategy FrameworkIT Strategy Framework
IT Strategy FrameworkVishal Sharma
 
Managed it services
Managed it servicesManaged it services
Managed it servicesGss America
 
Integrated Project and Solution Delivery And Business Engagement Model
Integrated Project and Solution Delivery And Business Engagement ModelIntegrated Project and Solution Delivery And Business Engagement Model
Integrated Project and Solution Delivery And Business Engagement ModelAlan McSweeney
 
Define an IT Strategy and Roadmap
Define an IT Strategy and RoadmapDefine an IT Strategy and Roadmap
Define an IT Strategy and RoadmapAndrew Byers
 
IT Strategy
IT Strategy IT Strategy
IT Strategy Tu Pham
 
Microsoft Fabric: How to Accelerate AI with Data
Microsoft Fabric: How to Accelerate AI with DataMicrosoft Fabric: How to Accelerate AI with Data
Microsoft Fabric: How to Accelerate AI with DataBrainSell Technologies
 
OpenText Cloud Managed Services
OpenText Cloud Managed ServicesOpenText Cloud Managed Services
OpenText Cloud Managed ServicesOpenText
 
Enterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessEnterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessNathaniel Palmer
 
Modern Data Warehousing with the Microsoft Analytics Platform System
Modern Data Warehousing with the Microsoft Analytics Platform SystemModern Data Warehousing with the Microsoft Analytics Platform System
Modern Data Warehousing with the Microsoft Analytics Platform SystemJames Serra
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Canada
 
Orchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service managementOrchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service managementAlan McSweeney
 
Azure vmware solutions para partners
Azure vmware solutions para partnersAzure vmware solutions para partners
Azure vmware solutions para partnersskadobayashi
 
Architecting Cloud Applications - the essential checklist
Architecting Cloud Applications - the essential checklistArchitecting Cloud Applications - the essential checklist
Architecting Cloud Applications - the essential checklistObject Consulting
 
IT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSIT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSRazak Mohammed Ali
 

What's hot (20)

PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Cloud Adoption Framework - Overview_partner.pptx
Cloud Adoption Framework - Overview_partner.pptxCloud Adoption Framework - Overview_partner.pptx
Cloud Adoption Framework - Overview_partner.pptx
 
On-premise to Microsoft Azure Cloud Migration.
 On-premise to Microsoft Azure Cloud Migration. On-premise to Microsoft Azure Cloud Migration.
On-premise to Microsoft Azure Cloud Migration.
 
Tungsten Fabric and DPDK vRouter Architecture
Tungsten Fabric and DPDK vRouter ArchitectureTungsten Fabric and DPDK vRouter Architecture
Tungsten Fabric and DPDK vRouter Architecture
 
IT Strategy Framework
IT Strategy FrameworkIT Strategy Framework
IT Strategy Framework
 
Managed it services
Managed it servicesManaged it services
Managed it services
 
Integrated Project and Solution Delivery And Business Engagement Model
Integrated Project and Solution Delivery And Business Engagement ModelIntegrated Project and Solution Delivery And Business Engagement Model
Integrated Project and Solution Delivery And Business Engagement Model
 
Criteria For EA Tool Selection
Criteria For EA Tool SelectionCriteria For EA Tool Selection
Criteria For EA Tool Selection
 
Define an IT Strategy and Roadmap
Define an IT Strategy and RoadmapDefine an IT Strategy and Roadmap
Define an IT Strategy and Roadmap
 
Azure Sentinel.pptx
Azure Sentinel.pptxAzure Sentinel.pptx
Azure Sentinel.pptx
 
IT Strategy
IT Strategy IT Strategy
IT Strategy
 
Microsoft Fabric: How to Accelerate AI with Data
Microsoft Fabric: How to Accelerate AI with DataMicrosoft Fabric: How to Accelerate AI with Data
Microsoft Fabric: How to Accelerate AI with Data
 
OpenText Cloud Managed Services
OpenText Cloud Managed ServicesOpenText Cloud Managed Services
OpenText Cloud Managed Services
 
Enterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessEnterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful Business
 
Modern Data Warehousing with the Microsoft Analytics Platform System
Modern Data Warehousing with the Microsoft Analytics Platform SystemModern Data Warehousing with the Microsoft Analytics Platform System
Modern Data Warehousing with the Microsoft Analytics Platform System
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying IT
 
Orchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service managementOrchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service management
 
Azure vmware solutions para partners
Azure vmware solutions para partnersAzure vmware solutions para partners
Azure vmware solutions para partners
 
Architecting Cloud Applications - the essential checklist
Architecting Cloud Applications - the essential checklistArchitecting Cloud Applications - the essential checklist
Architecting Cloud Applications - the essential checklist
 
IT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMSIT Infrastructure Managed Services and RIMS
IT Infrastructure Managed Services and RIMS
 

Similar to Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)

NATO Federated Mission Networking
NATO Federated Mission NetworkingNATO Federated Mission Networking
NATO Federated Mission NetworkingJohn Palfreyman
 
Dublinked tech workshop_15_dec2011
Dublinked tech workshop_15_dec2011Dublinked tech workshop_15_dec2011
Dublinked tech workshop_15_dec2011Dublinked .
 
Overview of Sponsor Sessions in Berlin
Overview of Sponsor Sessions in BerlinOverview of Sponsor Sessions in Berlin
Overview of Sponsor Sessions in BerlinNetApp Insight
 
MicroLink Corporate Overview
MicroLink Corporate OverviewMicroLink Corporate Overview
MicroLink Corporate OverviewMicroLink, LLC
 
Introduction of file based workflows 111004 vfinal
Introduction of file based workflows 111004 vfinalIntroduction of file based workflows 111004 vfinal
Introduction of file based workflows 111004 vfinalMarie Josée (MJ) Drouin
 
Spatial data infrastructure in the cloud, 2011
Spatial data infrastructure in the cloud, 2011Spatial data infrastructure in the cloud, 2011
Spatial data infrastructure in the cloud, 2011Moullet
 
Skillwise Consulting -Technical competency
Skillwise Consulting -Technical competencySkillwise Consulting -Technical competency
Skillwise Consulting -Technical competencySkillwise Consulting
 
Sybase Global Infrastructure
Sybase Global InfrastructureSybase Global Infrastructure
Sybase Global InfrastructureRobert Mobley
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Serviceswebhostingguy
 
VMWare and SoftLayer Hybrid IT
VMWare and SoftLayer Hybrid ITVMWare and SoftLayer Hybrid IT
VMWare and SoftLayer Hybrid ITBenjamin Shrive
 
Vitalii_Gonchar_P_updated
Vitalii_Gonchar_P_updatedVitalii_Gonchar_P_updated
Vitalii_Gonchar_P_updatedvitalka_ua
 
RichardRexPalace(Cobol,DB2 Lifecomm-Life70-doc)
RichardRexPalace(Cobol,DB2 Lifecomm-Life70-doc)RichardRexPalace(Cobol,DB2 Lifecomm-Life70-doc)
RichardRexPalace(Cobol,DB2 Lifecomm-Life70-doc)Richard (Rex) Palace
 
BP306 - Connecting the dots between Domino, Notes 9 and Connections
BP306 - Connecting the dots between Domino, Notes 9 and ConnectionsBP306 - Connecting the dots between Domino, Notes 9 and Connections
BP306 - Connecting the dots between Domino, Notes 9 and Connectionspanagenda
 
Connect2013: BP306 Connecting the Dots between IBM Domino, Notes 9 and IBM Co...
Connect2013: BP306 Connecting the Dots between IBM Domino, Notes 9 and IBM Co...Connect2013: BP306 Connecting the Dots between IBM Domino, Notes 9 and IBM Co...
Connect2013: BP306 Connecting the Dots between IBM Domino, Notes 9 and IBM Co...Franziska Tanner
 
Segue Capabilities Briefing Winter 2010
Segue Capabilities Briefing Winter 2010Segue Capabilities Briefing Winter 2010
Segue Capabilities Briefing Winter 2010DavidHart
 
Shay - 2018 updated
Shay - 2018 updatedShay - 2018 updated
Shay - 2018 updatedNathan Shay
 

Similar to Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS) (20)

NATO Federated Mission Networking
NATO Federated Mission NetworkingNATO Federated Mission Networking
NATO Federated Mission Networking
 
Dublinked tech workshop_15_dec2011
Dublinked tech workshop_15_dec2011Dublinked tech workshop_15_dec2011
Dublinked tech workshop_15_dec2011
 
Overview of Sponsor Sessions in Berlin
Overview of Sponsor Sessions in BerlinOverview of Sponsor Sessions in Berlin
Overview of Sponsor Sessions in Berlin
 
MicroLink Corporate Overview
MicroLink Corporate OverviewMicroLink Corporate Overview
MicroLink Corporate Overview
 
Introduction of file based workflows 111004 vfinal
Introduction of file based workflows 111004 vfinalIntroduction of file based workflows 111004 vfinal
Introduction of file based workflows 111004 vfinal
 
Joel_M_Arrington_Retired_Resume
Joel_M_Arrington_Retired_ResumeJoel_M_Arrington_Retired_Resume
Joel_M_Arrington_Retired_Resume
 
Spatial data infrastructure in the cloud, 2011
Spatial data infrastructure in the cloud, 2011Spatial data infrastructure in the cloud, 2011
Spatial data infrastructure in the cloud, 2011
 
Skillwise Consulting -Technical competency
Skillwise Consulting -Technical competencySkillwise Consulting -Technical competency
Skillwise Consulting -Technical competency
 
Sybase Global Infrastructure
Sybase Global InfrastructureSybase Global Infrastructure
Sybase Global Infrastructure
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Services
 
VMWare and SoftLayer Hybrid IT
VMWare and SoftLayer Hybrid ITVMWare and SoftLayer Hybrid IT
VMWare and SoftLayer Hybrid IT
 
Resume
ResumeResume
Resume
 
Vitalii_Gonchar_P_updated
Vitalii_Gonchar_P_updatedVitalii_Gonchar_P_updated
Vitalii_Gonchar_P_updated
 
RichardRexPalace(Cobol,DB2 Lifecomm-Life70-doc)
RichardRexPalace(Cobol,DB2 Lifecomm-Life70-doc)RichardRexPalace(Cobol,DB2 Lifecomm-Life70-doc)
RichardRexPalace(Cobol,DB2 Lifecomm-Life70-doc)
 
BP306 - Connecting the dots between Domino, Notes 9 and Connections
BP306 - Connecting the dots between Domino, Notes 9 and ConnectionsBP306 - Connecting the dots between Domino, Notes 9 and Connections
BP306 - Connecting the dots between Domino, Notes 9 and Connections
 
Connect2013: BP306 Connecting the Dots between IBM Domino, Notes 9 and IBM Co...
Connect2013: BP306 Connecting the Dots between IBM Domino, Notes 9 and IBM Co...Connect2013: BP306 Connecting the Dots between IBM Domino, Notes 9 and IBM Co...
Connect2013: BP306 Connecting the Dots between IBM Domino, Notes 9 and IBM Co...
 
Technical Skillwise
Technical SkillwiseTechnical Skillwise
Technical Skillwise
 
Segue Capabilities Briefing Winter 2010
Segue Capabilities Briefing Winter 2010Segue Capabilities Briefing Winter 2010
Segue Capabilities Briefing Winter 2010
 
Vitaly gritsenko
Vitaly gritsenkoVitaly gritsenko
Vitaly gritsenko
 
Shay - 2018 updated
Shay - 2018 updatedShay - 2018 updated
Shay - 2018 updated
 

More from Forcepoint LLC

Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Forcepoint LLC
 
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsSparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsForcepoint LLC
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIForcepoint LLC
 
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Forcepoint LLC
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in CybersecurityForcepoint LLC
 
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesUsing Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesForcepoint LLC
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Forcepoint LLC
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint LLC
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudForcepoint LLC
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applicationsForcepoint LLC
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...Forcepoint LLC
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?Forcepoint LLC
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsForcepoint LLC
 
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusA Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusForcepoint LLC
 
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouCyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouForcepoint LLC
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksForcepoint LLC
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterForcepoint LLC
 
Embracing the Millennial Tsunami
Embracing the Millennial TsunamiEmbracing the Millennial Tsunami
Embracing the Millennial TsunamiForcepoint LLC
 

More from Forcepoint LLC (20)

Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)
 
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsSparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security Behaviors
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesUsing Language Modeling to Verify User Identities
Using Language Modeling to Verify User Identities
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusA Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human Focus
 
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouCyber Convergence, Warfare and You
Cyber Convergence, Warfare and You
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
 
Embracing the Millennial Tsunami
Embracing the Millennial TsunamiEmbracing the Millennial Tsunami
Embracing the Millennial Tsunami
 
Shift the Burden
Shift the BurdenShift the Burden
Shift the Burden
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)

  • 1. 4/20/2017 May 26, 2015 Mission Partner Environment Information System (MPE-IS) “Globally integrated operations, increasing the overall adaptability of the force to cope with uncertainty, complexity and rapid change.” JF2020
  • 3. 4/20/2017 Background • Capstone Concept for Joint Operations (CCJO): Joint Force 2020, 28 September 2012 “In this concept, Joint Force elements, globally postured, combine quickly with each other and mission partners to integrate capabilities fluidly across domains, echelons, geographic boundaries, and organizational affiliations.” • CJCS JIE White Paper, 22 January 2013 “JIE is critically important to achieving this vision” • DOD CIO, December 2014: “Let’s Accelerate MPE…” • 15-Star Memo to DOD CIO: “…Single MPE to be fully operational by FY16…”
  • 4. 4/20/2017 MPE-IS SEC/REL Cloud Bottom-line Up Front (BLUF) • MPE-IS globally postures the Joint Force to swiftly form, evolve, dissolve and reform information-sharing environments across DOD and mission partners • MPE-IS simplifies and standardizes information sharing through virtualization technologies – Transitioning from physical to virtual capabilities enables rapid mission network creation – Standardization reduces hardware, software and labor costs to stand-up new mission networks – A shared suite of core services (e.g., email, chat, voice, VTC, etc.) – Provides a standardized suite of cybersecurity defense • MPE-IS aligns mission partner sharing to a common capability – Capitalizes and/or recapitalizes on existing mission partner systems and initiatives – Aligns with NATO’s Federated Mission Networking (FMN) capabilities – All Commercial Off-the-Shelf products 4
  • 5. MPE-IS: The Future of C2 Networking 5 • Physically Separate Resources (Compute, Storage, & Network) • Variations in Software, Hardware, Security, etc. • No License or Infrastructure Sharing • Manually Intensive • Low Agility • Private Cloud Architecture • Mission Enclave networks are virtualized • Application Pooled Licenses across enclaves • Compute resources shared across enclaves • Storage resources pooled across enclaves • High Agility Current C2 Networks MPE-IS Cloud (Multiple Enclaves)
  • 6. Shared MPE-IS MPE-IS SEC/REL Domain Vision Today: Regional & Physical – SIPRNET – Independent – Non-Standard Baselines – Mixed Security – Manual Federations – Type I Encryption Only – Labor-Intensive Standup – Thick Clients Only 6 FY18-24: Global & Virtual – Off-SIPRNET – Robust “Shared” Service Suite & Automated Federations – Standardized E2E Baseline – Approved Security – On-Demand Provisioning – CSfC with Some Type 1 – “Global” Fight-Tonight Capability Across All Domains – “Zero, Thin, MEC, & Mobile” Clients FY16-18: Regional & Virtual – Off-SIPRNET – “Shared” Basic Services & Manual Federations – Standardized Virtual Data Center Baseline – Approved Security – Partial Automated Provisioning – Type 1 w/ Commercial Solutions for Classified (CSfC) – “Regional” Fight-Tonight SEC/REL – Migration to “Zero, Thin, Multi-Enclave Client (MEC)” FY16: Email w/attachments, Chat, Voice, VTC, ISR (FMV), COP, Web/File Share, GAL, Office Automation, Print, Classification Tool (Available now) FY17+: OMS and Language Translation (Available Aug 17)
  • 7. MPE-IS Target Architecture Single MPE-IS Node 7 MPE-IS Virtual Data Center MPE-IS Contingency Capacity MPE-IS Mission Enclave - F VDI Mission Specific Services Core Services (Email, Chat, VTC, VOIP) Support Services (ITSM, Office OA, Print) US Provided US User Mission Partner User US User Mission Partner Cross Domain Services MPE-IS Mission Enclave - B Mission Specific Services Core Services (Email, Chat, VTC, VOIP) Support Services (ITSM Office OA, Print) MPE-IS Mission Enclave – A Mission Specific Services Core Services (Email, Chat, VTC, VOIP) Support Services (ITSM office, OA, Print) US BICES-X MAC - D Core Services (Email, Chat, VTC, VOIP) US BICES-X MAC - C Core Services (Email, Chat, VTC, VOIP) C2, Logistics, Weather, etc US BICES US SIPR US BICES-X: TNE CD Transfer Services (chat, email) MLS File Share MPGW-X MPE-IS Mission Enclave - E VDI Mission Specific Services Core Services (Email, Chat, VTC, VOIP) Support Services (ITSM, Office OA, Print) Mission Partner Support Services Support Services US User Mission Partner User VDI VDI Mission Partner Thin, Thick, or Zero MEC, Thin, Thick, or Zero Thin, Thick, or Zero Thin, Thick, or Zero Thin, Thick, or Zero MEC, Thin, Thick, or Zero MEC, Thin, Thick, or Zero MEC, Thin, Thick, or Zero CMNT with CFSC and Type 1 MPGW-X • Global Resiliency (COOP) • Can Accommodate More than C2 (e.g. ISR)
  • 8. 4/20/2017 Next Steps • Test MPE-IS Capabilities • Manage MPE-IS Development and Builds • Continue System Maturity • Rationalize and Converge Legacy Systems • Expand and Increase Commercialization 8