SlideShare a Scribd company logo
1 of 75
Download to read offline
1
May 28, 2014
TELECOMMUNICATIONS TRANSFORMATION PROGRAM
Network Solutions Supply Chain
Industry Day
2
Network Solutions Supply Chain Industry Day
Industry Day Objectives
• Share Telecommunications Transformation plans with industry
suppliers and engage in a dialogue regarding Network Solutions
Solutions Supply Chain
• Explain the proposed “Collaborative Procurement Solutions”
approach
• Address the Cyber Security Supply
Chain Threat
• Elicit written feedback from suppliers on
the questions posed during this
presentation
3
Network Solutions Supply Chain Industry Day
Agenda
TIME PRESENTER DESCRIPTION
1:00 - 1:05 pm
John Dullaert
Director, Telecommunications Transformation Program,
Shared Services Canada (SSC)
Opening Remarks and
Industry Day Objectives
1:05 – 1:35 pm
Benoît Long
SADM, Transformation, Service Strategy and Design, SSC
SSC Transformation Overview
1:35 - 2:30 pm
Michel Fortin
DG, Telecommunications Transformation Program, SSC
Network Solutions:
Overview, High Level Requirements
and Discussion Topics
2:30 – 2:35 pm Break
2:35 – 3:20 pm
Michel Fortin
DG, Telecommunications Transformation Program, SSC
Network Solutions:
Key Questions
3:20 – 3:50 pm
Tom Mercer
Manager, Telecommunications Systems Division,
Procurement and Vendor Relationships, SSC
Collaborative Procurement
Solutions Approach
3:50 – 4:20 pm
Brad McInnis
Security Strategic Relationships Office,
Communications Security Establishment Canada
Simon Levesque
Sr. Director Planning and Design, Cyber and IT Security
Transformation Program, SSC
Supply Chain Security Information
Assessment (SCSI)
4:20 – 4:50 pm
John Dullaert
Director, Telecommunications Transformation Program, SSC
Questions and Answers,
Recap / Closing Remarks
4
May 28, 2014
TELECOMMUNICATIONS TRANSFORMATION PROGRAM
Network Solutions Supply Chain (NSSC)
Industry Day
Shared Services Canada (SSC)
Transformation Overview
Benoit Long
Senior Assistant Deputy Minister
Transformation, Service Strategy & Design
Shared Services Canada
5
SSC Transformation Overview
Agenda
• Industry Day Objectives
• SSC Transformation Objectives and Purpose
• Transformation Timeline
• Transformation Phased Approach
• Current State
• Target End State
• Business and Functional Requirements
• Engagement
• Wrap up
6
SSC Transformation Overview
Purpose of Industry Day
• To provide background on telecommunications transformation with a focus on
Intra-building Local Area Network transformation
• To continue a dialog with Industry to learn what are the best and most
innovative options available in the market today that will support the
Government of Canada’s requirements for developing a Network Solutions
Supply Chain
– Obtain industry input on the strategy for developing a comprehensive strategy for
transforming Intra-building Local Area Networks while maintaining the existing
environment
– Advice that could lead to better pricing (based on past experience)
– Address questions regarding process
– Set the stage for the supplier written responses
7
SAVINGS
Transformation will
match service levels
to partner priorities
SECURITY
Transformation will
realize material cost
savings and avoid
future costs
SERVICE
Transformation will
provision a secure
environment to meet
program needs
SSC Transformation Overview
Transformation Objectives
8
EMAIL
DATA
CENTRE
NET-
WORK
WORK-
PLACE
TECHNOLOGY
DEVICES
One Email Solution
Objective: Migrate the GC to a single,
outsourced, secure email system
Objective: Consolidate the GC’s 485 data
centres into 7 modern and efficient facilities
A government-wide footprint of
7 data centres
Consolidated procurement of end-
user device hardware and software
Objective: Consolidate procurement of end-
user devices & related software
A single government-wide
telecommunications network
Objective: Streamline and modernize the
GC’s telecommunications infrastructure
and services
SSC Transformation Overview
Purpose of Transformation
SSC will transform the GC’s aging IT infrastructure by delivering:
9
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
SSC Transformation Overview
Timeline
FY 13/14 FY 14/15 FY 15/16 FY
18/19
FY
19/20
NET -
WORKS
Contract
Awards
Migration Complete
DATA
CENTRE
Centre de Données de l’ouest du Quebec/
Development 1 Complete
Production 2 Established
Macdonald-Cartier Data Centre / Development 2 Refurbishment Complete
Borden/Production 1 Expansion Complete
Borden / Production 1 Interim Established Production 4 Established
Production 3 Established
Building-by building migration begins
CYBER &
IT
SECURITY
FY 16/17 FY
17/18
Security Operations Centre Release 1
Network Security
Transformation Plan
Security Operations Centre Release 2 Security Operations Centre Release 3
PRODUCTION
DEVELOPMENT
SCIENTIFIC
Science Data Centre Replacement Complete
GCNET
WAN
WIFI/LAN
VIDEOCONF.
(BOARDROOMS)
GC Service 1.0 Established
(ongoing service improvements;
releases as required)
GC Commitments
Fulfilled
Strategy for
Multi-Tenant buildings
Pilot
Complete
Managed Security Service
Contract Award
CYBER SECURITY
IT SECURITY
GC SECRET
INFRASTRUCTURE
Supercomputing Consolidation Complete
Migration CompleteBuilding-by building migration begins
Migration to enterprise services
(Contact Centre Infrastructure and Toll Free Services)
CONTACT
CENTRE
Migration CompleteContract
Award(s)
Consolidation Complete
Data Centre supply chain established
Contract
Award
WORKPLACE
COMMS
Migration CompleteBuilding-by building migration begins
Software Service
Design
Hardware Service Design
Software Sourcing Strategy
Hardware Sourcing Strategy
PROVISIONING
SERVICES
WORKPLACE
TECHNOLOGY
SERVICES
Initiate & Develop Pilots Pilots Incremental Transition to Enterprise
EMAIL &
BB10
Contract Award Wave 0 Wave 1 Wave 2 Wave 3
EMAIL
BB10
Execute in Waves (Break/Fix)
BB10 rollout complete
Migration
Release 1 (tactical)
Release 2 – C5 Upgrade
Release 3 – Implementation
Pilot (SSC, TBS, Foreign Affairs and
Trade Development Canada
GC Service 2.0
WORKPLACE
TECHNOLOGY
DEVICES
10
Overall
Approach
Pre-
Planning
Planning
Execution
STEP 3 - PLANNING
• Define organization structure
• Define migration and receiving teams
• Develop HR Management and Talent Plans
• Project-ize by priority
• Align network consolidation plan with data centre and
application migration requirements
STEP 2 - PRE-PLANNING
• Produce detailed current state / asset
and application information
• Develop detailed partner
requirements
– Business cycles
– Application refresh plans
– Overall readiness
• Define all Data Centre
and Telecom Services
• Develop Consolidation
Priority List (CPL)
• Conduct Procurement
(including P3, etc.)
STEP 1 - ESTABLISH OVERALL APPROACH
• Produce Reference Architecture
• Establish Core Services roadmap
• Develop “Migration Factory” approach
• Define consolidation sequence –
Competing factors
• Determine sourcing strategies
• Develop security by design
STEP 4 - EXECUTION
• Establish enterprise
data centres and GC Network
• Build new operations organization
• Establish all ITSM tools and processes
• Build migration and receiving teams
• Perform quality control
• Assist partners in the migration of
all business applications
• Install and configure new infrastructure
• Close (“shred”) data centres as they are vacated
Core Foundation Services in Place
SSC Transformation Overview
Transformation Phased Approach
11
LAN1 – Dept. A LAN5 – Dept.Q
LAN4 – Dept H
LAN3 – Dept.F
LAN2 – Dept. B
LAN7
LAN4 000
LAN5 – Dept. Q
LAN4 – Dept. H
LAN7
LAN6
Dept. A:
small data centre
LAN2 – Dept. B
LAN7
LAN6
Dept. H:
small data centre
Dept. F:
small data centre
LAN3 999
LAN7
LAN6
50 wide area
networks
(WAN)
LAN6
SSC Transformation Overview
Current State of Buildings, Networks and Data Centres
Dept. F:
small data centre
…
Dept. A:
large data centre
Dept. Q:
small data centre
Dept. B:
small data centre
Dept. D:
small data centre
…
WAN2WAN1 WAN 50WAN3
12
SSC Transformation Overview
Target End State
SECURITY
• All departments share one
enterprise/common zone
• Access to sensitive
departmental data is
secured through restricted
zones
• Developers do not have
access to production
infrastructure
• Classified information
below Top Secret
• Consolidated, controlled,
secure perimeters
• Balance security and
consolidation
• Certified and Accredited
infrastructure
CHARACTERISTICS
• Integrated (single,
common, secure GC
network will link all service
delivery points)
• High performance
• Secure
• Cost-effective
• Standardized (based on
open standards,
modularized design)
• Mobile (wireless technology
will be maximized where
cost-effective)
• Responsive and resilient
CONSOLIDATION
PRINCIPLES
1. As few wide area networks
as possible
2. All departments share
network access in multi-
tenant buildings
3. Network equipment is
shared
4. Telecom hubs (call
managers, VC bridges)
located in enterprise data
centres or common points
of presence
5. Inter-data centre
connections should be
diverse and fully redundant
6. Scalable and flexible
infrastructure
7. Performance levels should
be similar wherever
possible
8. Contracts/services will be
consolidated
BUSINESS INTENT
• Business to Government
• Government to Government
• Citizens to Government
13
SSC Transformation Overview
Business Requirements
• Support a wide variety of federal government programs and applications
ranging from corporate file stores and routine data exchanges, to real-time
government-wide mission-critical military, policy, health and public safety
information
• Enterprise infrastructure and service management to eliminate silos and
facilitate interoperability across departments and agencies
• Reduce duplication and inefficiencies
• Ensure high availability for mission critical applications
• Standardize service levels to ensure a consistent delivery and availability of
Data Centre services across all SSC partners and agencies
• Built-in, on-going competition to ensure best value, continuous improvement
and innovation of services
• Security: Supply must meet the Trusted Supply Chain Requirements
(identified in the “Supply Chain Integrity” presentation to follow)
14
• Supplier diversity for Local Area Networks
• Open standards to allow for workload mobility / portability across
suppliers
• Certified compliance and compatibility with SSC reference
architectures
• Must support self-service / self-provisioning of local area network
services
• Must support just-In-time capacity
• Frequent market checks to take advantage
of technology, economic or market shifts
• Provisions for annual price competition to ensure
best value to Canada
• Must support a secure, multi-tenant environment
(GC Domains and Zones)
SSC Transformation Overview
Functional Requirements
15
SSC Transformation Overview
Telecom Transformation Program Conceptual Framework
Operations (People, Process, Technology)
Intra-building
Network
Internet Connectivity
ITServiceManagement
Network and Cyber Security Operations Centre
Inter-building Network
Intra-Data Centre
Networks
Inter-Data Centre
Networks
Voice, Video, Instant Messaging, Presence
and Conferencing Services
ProgramManagement
NetworkSecurity
IT Services
Contact Centre Infrastructure Services
CONVERGED
COMMUNICATIONS
(Application Layer)
NETWORKS
(Transport Layer)
FRAMEWORK ELEMENTS
16
INTERNET
EnhancedEnterpriseSecurity
Telecom Components in a Building…
INTRA-BUILDING NETWORK (LAN / WIFI)
INTER-DATA
CENTRE NETWORK
INTRA-DATA
CENTRE NETWORK
• Network Switches
• Cables
• Routers
• Etc...
BUILDING A
GC NETWORK
377 000 users
3 000+ sites
SSC Transformation Overview
Telecom Transformation Program Components
17
SSC Transformation Overview
Engagement - IT Infrastructure Roundtable and Advisory Committees
• SSC recognizes the value and contribution of the Information and
Communications Technology (ICT) sector, and the important role that sector can
play in the transformation of the Government of Canada’s IT infrastructure
• The ITIR is a forum that SSC uses to
harness the benefits of a diverse and
innovative supplier community to build
a secure, lower-cost, more effective
technology platform for the
Government of Canada
• ITIR discussions focus on the
government’s long term IT
transformation agenda, emerging
technologies in the marketplace, and
first-use technologies
18
SSC Transformation Overview
Network Solutions Supply Chain - Engaging Industry for Feedback
• SSC also engages industry for feedback throughout the collaborative
procurement process, which will result in:
– A balance of industry capability with cost effectiveness
– Provide suppliers with the opportunity to share their knowledge with the
Government of Canada on key discussion topics
– Allow for an exchange of information through written response with
telecommunications experts that will ultimately inform
telecommunications transformation strategies and procurement planning
SOLICITATIONINDUSTRY
ENGAGEMENT
INVITATION TO
QUALIFY (ITQ)
REVIEW/REFINE
REQUIREMENTS
(RRR)
IMPLEM.
PHASES OF THE COLLABORATIVE PROCUREMENT PROCESS
19
Questions?
(for suppliers only)
SSC Transformation Overview
Wrap Up and Questions
20
Michel Fortin
Director General
Telecommunications Transformation Program
Transformation, Service Strategy and Design
May 28 2014
TELECOMMUNICATIONS TRANSFORMATION PROGRAM
Network Solutions Supply Chain (NSSC)
Industry Day
Overview
21
Objectives of Industry Engagement
Support intra-building network transformation of wired and wireless
(Wi-Fi) infrastructure and services
1. Maintain the existing network equipment and services as
transformation proceeds
• Highlight strategies and considerations for future service provision
of these services
– Strategies for Procurement Vehicles (sourcing and supply methods)
– Consolidation and Migration Strategies
– Bundling of products/solutions/services
– Consideration for including additional services
• Solicit input and feedback on key questions
1
2
• Determine the best strategy / approach to :
22
TRANSFORMING INTRA-BUILDING
NETWORK SERVICES
1
23
Strategic Context
 SSC will be transforming network infrastructure in buildings at
more than 3,580 sites nationally and internationally
INTRA-BUILDING CURRENT STATE
3580+ Sites 495 multi-tenant buildings
(61 “large” buildings (1000+ pop) )
4000+ Local Area Networks
24
CABLING SERVICE
• Wired infrastructure –
will continue to be
required for vertical
cabling, data centres,
wireless access points
and connections
requiring wiring
The components of the Intra-building network transformation are:
Intra-building Network Components
In scope for
Network Solutions Supply Chain (NSSC)
Out of scope for NSSC
WIRED LAN SERVICE
• Shared and modernized
infrastructure at 495
multi-tenant buildings
will be consolidated
• Simplified support and
management
WIFI NETWORK & SERVICE
• Improved employee
mobility / productivity &
supports Blueprint 2020
• Supports voice, video
and data
• 80% of user will have
WiFi access by 2020
25
The Network Equipment Support Services (NESS) standing offer is used
to procure new network equipment and support services (including a
one-year warranty and optional installation) from qualified
offerors for the following classes of equipment:
Note: Class 4.0 Firewall was deleted and is incorporated within 8
Current State – Network Equipment Support Services
LAN Switches1.0
Routers2.0
Layer 4-7 Devices
(application switches)
3.0
Intrusion Detection Systems5.0
VPN Appliances6.0
Optical Networking Devices7.0
Multi Class Equipment
(unified threat management network
equipment)
8.0
Wireless Systems9.0
Intrusion Prevention System10.0
Uninterruptible Power Supply11.0
Common Requirements
(across all classes)
12.0
26
• Network Infrastructure Management Services (NIMS) standing offer is used to
procure the maintenance of network hardware and software in the following
areas:
Current State – Network Infrastructure Management Services
REPLACEMENT:
Offeror is required to
acquire and deliver the
replacement
component to a
technical contact in an
identified timeframe
ON-SITE REPLACEMENT:
Offeror is required to acquire /
deliver and install the
replacement component on-site
or undertake whatever
maintenance and repair service
that is necessary to restore the
product to operational service
RETURN TO DEPOT:
Offeror is required to
receive the faulty
product, repair or
replace the product and
ship the repaired or
replaced product back to
the site
– IT Security Equipment
– Application / Software
– Specialized Device
• Maintenance services include the necessary hardware, software and resource
support for the fault restoration, ongoing functional operation and
preventative maintenance of products; 3 types of maintenance plans:
– Network Equipment
– Multi-Functional
Devices
1 2 3
27
Target State - Building View
Typical Building Profile General profile
• Combination of wireless and
wired infrastructure
• Some buildings will have
SECRET systems (require more
cabling and limit WiFi)
• Multi-tenant buildings will
share network equipment
• VoIP (hard and soft phones)
and/or cellular/smartphones
• Desktop videoconferencing
• Sharable VC rooms
28
KEY CHALLENGES
Key Challenges – Network Solutions
• Existing NESS does not support transformation well because it is
equipment-specific as opposed to solutions oriented
• Too many different items in the catalogue
• Interoperability is challenging between multiple OEMs (ie. OEMs
implement customized “open standards” which are not always
interoperable with other OEMs without loss of functionality)
• Standards are used differently across many networks
• Consolidation of partner / business domains with differing security
and privacy considerations
• Support to remote and international locations
• Executing transformation while maintaining the existing
infrastructure and services
29
GUIDING PRINCIPLES
Guiding Principles – Network Solutions
• Technology based open architecture and industry standards to
ensure flexibility and interoperability between existing and future
services
• Must be scalable and future-proof (e.g. support Software Defined
Network framework)
• Must support multi-tenancy (traffic isolation differentiated by partner)
and secure, controlled access to data
• Must support centralized management, configuration and
reporting
• Must ensure information is handled using the appropriate controls,
protocols and infrastructure to support the required level of security
• Network must support a self-serve model for data centre services
• Provide best value and total cost of ownership (TCO) for the
operations and management of services
30
MAINTAINING EXISTING NETWORK
SERVICES AND EQUIPMENT
2
31
CURRENT STATE
Maintaining Existing Network Services and Equipment
• To ensure ongoing support of GC Department and agencies, the
existing network infrastructure must be maintained during
transformation
• Existing supply arrangements (e.g. NESS) are used to maintain
existing network and IT security infrastructure (including Top Secret)
• Supply arrangements support all of Government of Canada
• Ongoing requirement to procure network and IT security products
and services
• NESS and NIMS will be replaced with procurement vehicles which
will support transformation
32
• Provide the ability to procure the following classes of network
products/components and/or services:
High Level Requirements
– Optical Networking Devices
– Network Monitoring and
Management
– Specialized Networking
– Wired Switches
– Wireless Networking
– Routers
– Application Delivery Networking Products
– Firewalls, including Deep Packet
Inspection
– Forward and Reverse Proxy
– Intrusion Detection and Prevention,
including network, host & wireless
– URL and Content Filtering,
including whitelisting, blacklisting
– Anti-Virus / Malware / Spyware
– Anti-Spam / Anti-Phishing
– Link Layer Security/VPN
(IPSec, SSL, TLS)
– Data Loss Prevention
– Vulnerability Assessments
– Network Forensics & Analysis
33
Considerations
Ensure support for:
• Varying service levels across SSC partners and clients
• Partner and client specific Security Requirements (e.g. Public
Safety, Correctional Services, National Security)
• High availability and fault tolerant standards must be maintained,
with minimal downtime for maintenance schedules, to ensure
continuous levels of service for mission critical applications
• Network Access Control, Network Encryption Layers, Network
Policy Management
• Virtualized environments
• Malware execution in Advanced Persistent Threat Detection
(APTD),including detection of DNS-based malware
CONSIDERATIONS
34
KEY DISCUSSION TOPICS
AND
QUESTIONS FOR INDUSTRY
FEEDBACK
35
SSC is trying to determine the strategy that will provide the best value
and lowest total cost of ownership (TCO) for the GC to deliver
transformed Intra-Building network services while maintaining existing
network services and providing standard levels of service.
Factors to consider for Procurement Vehicles:
Strategies for Procurement Vehicle
• Out-source
(fully managed)
• Hybrid
• In-Source
• Supply Arrangement (SA)
• Standing Offer (SO)
• Contract
• Worldwide
• By region
• Varies by site
• Buy
• Lease
• Bundled with services
VARIATION BY GEOGRAPHY?
• Nationally/ Worldwide
• By region
• Varies by site
• One for all categories
• One per category
(LAN, WiFI, etc.)
VARIATION BY OEM ?
SOURCING STRATEGY: SUPPLY METHOD:A B C SUPPLIER STRATEGY:
D PRODUCT (HW/SW)
SOURCING METHOD:
E PROCUREMENT CONSIDERATIONS
1
Discussion
Topic
36
Design and deliver the
solution by in-house SSC
resources using SSC
acquired infrastructure
components
SSC in-house resources
deliver parts of the
service on GC-owned
infrastructure while the
remainder is delivered
by a third party vendor
Sourcing Strategy
Outsourced /
Fully Managed
Co-Managed /
Hybrid
1. What are the benefits, technical challenges, requirements
and recommended pricing model for successful deployment
and ongoing support of each deployment model?
2. Which sourcing strategy would you recommend?
In-sourced /
In-House
EXAMPLE:
Vendor A provides the
design, Vendor B provides
the equipment /
infrastructure and SSC in-
house resources operate
EXAMPLE:
Buy the equipment /
infrastructure, and SSC
in-house resources build
and operate solutions
Third parties design,
provide and operate
the solution(s) through
a managed service
EXAMPLE:
Vendor provides the
end-to-end network
solution based on the
requirements provided
A
1
Discussion
Topic
37
1. What supply methods would you recommend to support intra-
building network transformation, and why?
2. If contract, what contract period would you recommend ?
Supply Method
• An offer from a potential
supplier to provide goods
and / or services at pre-
arranged prices, under
set terms and conditions,
when and if required
• Not a contract until the
government issues a "call-
up" against the standing
offer.
• The government is under
no actual obligation to
purchase until that time
• A method of supply to
procure goods and services
• Not a contract and neither party
is legally bound as a result of
signing a supply arrangement
alone
• Includes a set of predetermined
conditions that will apply to bid
solicitations and resulting
contracts
• Allows government to solicit
bids from a pool of pre-qualified
suppliers for specific
requirements
• A voluntary,
deliberate, and
legally enforceable
agreement between
two or more competent
parties
• Each party to a
contract acquires
rights and duties
relative to the rights
and duties of the other
parties
Source: “An Introduction to procurement “manual and https://buyandsell.gc.ca/
B
Contract Standing Offer Supply Arrangement
1
Discussion
Topic
38
1. Which supplier strategy would you recommend?:
(ie. a single supplier nationally, by region or by site? or
continuation of a model with potentially varying
resellers/OEMs for each procurement of products?
2. What are the pros and cons of each option?
Supplier Strategy
One prime supplier
to transform all sites
worldwide
SUPPLIER BY REGION
WORLDWIDE/NATIONAL
Suppliers will
transform the sites
within respective
regions
SUPPLIER BY SITE
Allows suppliers to vary by site
based on site requirements
and complexity (e.g. small,
medium, large sites)
C
A site could be:
• Campus
• Military base
• DCN
• Remote sites
• Etc.
1
Discussion
Topic
39
Sourcing Method
There are various sourcing methods available including
leasing/procuring managed services, buying or leasing products
with in-house services:
1. Which categories do you recommend that we lease services
rather than buy/lease products and perform services in-house?
2. In the case that products are acquired do you recommend that
they be bought or leased? Why?
3. What are the pros and cons of each option: buy vs. lease vs.
bundle with services?
D
BUY
PRODUCTS ?
LEASE
PRODUCTS?
BUNDLE PRODUCTS
WITH SERVICES?
(BUY ENTIRE SOLUTIONS)
vs vs
1
Discussion
Topic
LEASE
SERVICES
vs
40
Products/solutions can be procured or leased from a single or
multiple OEMs:
1. For each service category (eg. Wired LAN, WiFi, etc), do you
recommend that products/solution sets be procured entirely
from the same original equipment manufacturer(OEM)?
2. In the case of multiple OEMs, which types of
solutions/products (eg. LAN switches, routers, etc) will be
easy/challenging to integrate between various manufacturers’
products? Which industry standards should be adopted to
improve interoperability?
Procurement – OEM ConsiderationsE
SINGLE ORIGINAL EQUIPMENT
MANUFACTURER (OEM)
(“UNIFORM”)
BY SERVICE CATEGORY
vs
1
Discussion
Topic
MULTIPLE ORIGINAL EQUIPMENT
MANUFACTURERS (OEMS)
(“BEST IN CLASS”)
BY SERVICE CATEGORY
41
Products, solutions and services can be procured for all locations,
by region or even by site:
1. For each solution/service type, which model would you
recommend (i.e. procure the same solution set/service provider
for all locations, for each region or for every site? Why ?
2. Should products and/or services international locations be
procured separately?
Procurement – Geographical ConsiderationsE
Options Region X Region Y Etc…
Building 1 Building 2 Building 3 Building 4 Building X
All
locations
OEM A OEM A OEM A OEM A OEM A
Supplier
by Region
OEM A OEM A OEM B OEM B OEM X
Supplier
by Site
OEM A OEM B OEM B OEM C OEM X
1
Discussion
Topic
42
Consolidation and Migration Strategies
SSC will be using a building-by-building approach for
telecommunications services delivered inside buildings
(eg. network, voice and videoconferencing services)
Are there strategies that you would recommend to:
1. Minimize user disruption and maximize resource efficiency during the roll out
phase of these initiatives?
2. Are there migration strategies which you would recommend to migrate and
consolidate the various partner domains (workload migration, overlapping
network addressing, etc.) particularly within a multi-tenant environment?
HOW THE TELECOMMUNICATIONS COMPONENTS FIT TOGETHER
2
Discussion
Topic
43
Bundling of Products/Solutions/Services
There are many products, solution sets and/or services
which could be bundled together.
1. Which products, solutions and/or services would you
recommend bundling together? (e.g. should routers
and firewalls be bundled together) Why ?
2. Should network and security products be procured
together?
3. In the case where product/solutions are procured,
should maintenance (beyond the warranty period) be
bundled together or procured separately?
3
Discussion
Topic
44
Considerations for including additional services
• Recently, SSC held an Industry Engagement on Inter and
Intra Data Centre Network services, to gather valuable feedback
on the approach for delivering the DCN services
• Based on the feedback received, SSC is considering the option
of including the Inter and Intra DCN services within the scope of
the NSSC procurement vehicle, to enable the flexibility of
defining a hybrid model
• Should NSSC procurement vehicles include products/solutions
related to Data Centre Networks or should these be procured
separately ?
• Should other categories of products such as videoconferencing
products be included in NSSC? If so, which ones would you
recommend including ?
4
Discussion
Topic
45
Health Break
46
SSC is seeking a strategy that will enable the GC to cost-effectively
deliver transformed Intra-Building network services. The following are
areas of consideration:
A. Sourcing Strategy: What is the recommended sourcing model for intra-
building network services (Out-sourced service, Hybrid or In-sourced)?
What are the benefits, technical challenges, requirements and
recommended pricing model for successful deployment and ongoing
support of each deployment model?
B. Open Standards: Which standards should be adopted to ensure
interoperability between different OEMs? Which ones should be avoided ?
Are there areas where interoperability between OEM products is
challenging ? Are there situations where a single OEM model would be
recommended? Which type of equipment where OEM variation could be
considered by region/site? What are the integration/interoperability
implications of each option?
Key Questions for Industry Feedback
STRATEGY
47
C. Bundling: Which services or group of products should be bundled together
when procuring a solution? Should other areas such as videoconferencing end-
points and data centre networks be bundled in or kept in separate procurement
vehicles?
D. Buy vs Lease:
Should the products/services be procured or leased? What are the pros and
cons of each option: buy vs. lease vs. bundle with services?
E. Supplier Strategy: What supply method would be optimal to achieve best
value/lowest TCO and interoperability? Should certain products/solutions be
bundled into a single contract/supplier/service provider over a long period (ie.
years) ? If so, for how long? Should this be separated by region? For services,
should single or multiple service providers be considered? What are the pros and
cons for each option?
F. Transformation Strategy: What are some key considerations/strategies in
consolidating networks? What procurement strategies were used in these
cases? (i.e. integrators, service providers, buy/lease. Provide examples, use
cases, white papers, etc.
Key Questions for Industry Feedback (continued)
48
1. What support model would you propose for a site once it has been
transformed, considering both the multi-tenant and single tenant site?
2. What are the strategies, technical considerations and challenges for
ensuring smooth integration with Integrated Command Centre
(DOC/NOC/SOC) and other enabling foundational services (DNS,
DHCP, ICAM, etc.)?
3. What are the possible technology or service enhancements over the
coming years that we may need to consider in our requirements? How
can emerging trends/technologies be incorporated into the proposed
solutions? How can we keep technologies up to date given the length
of transformation? How could they contribute to the Savings, Security
and Service objectives?
Additional Questions for Industry Feedback
OPERATIONAL/TECHNICAL:
49
4. What value-added services would you recommend that we should
be incorporating? For example Videoconferencing services and
Data Centre Network services (Inter & Intra) be bundled within the
same procurement vehicles as those related to Network Solutions
Supply Chain.
5. What are the perceived barriers to success and risks that require
mitigation strategies?
6. Please provide strategies/input on how SSC could best achieve the
use of current generation products and future generation products
throughout the lifetime of the procurement vehicle(s).
OPERATIONAL/TECHNICAL:
Additional Questions for Industry Feedback (continued)
50
7. How should SSC approach product substitutions in future
procurement vehicles?
8. Notwithstanding the requirements that have been identified today,
please provide insight and advice on how to best ensure ongoing
manufacturer supply chain integrity.
9. Please provide your views how to best integrate network security
into the proposed solutions/services, while keeping aligned with
technological enhancements that address the evolving threat
landscape?
OPERATIONAL/TECHNICAL:
Additional Questions for Industry Feedback (continued)
51
1. What strategy would you propose to improve procurement and lower
costs?
2. SSC recognizes that many different pricing models can be used to
achieve value to the Crown. Given the requirements outlined, please
suggest various pricing models that could be used for the different
sourcing options.
3. Should future procurement vehicles include categorization as currently
exists within the Network Equipment Support Services (NESS)
procurement vehicle or should a solutions-based approach be
pursued? What approach would you propose for future procurement
vehicles?
PROCUREMENT:
Additional Questions for Industry Feedback (continued)
52
4. Provide recommendations for requirements to maximize
competitiveness and reduce the TCO. What are the factors that
drive rates up?
5. What are the industry standards for wired and wireless services
should be included as part of requirements in future procurement
vehicles?
6. Should products/services for international locations be procured
separately? If so, why?
Additional Questions for Industry Feedback (continued)
PROCUREMENT:
53
Next Steps
• Industry feedback on discussion topics and questions
to be received by June 13, 2014
• Evaluate input / feedback received to refine
procurement and sourcing strategy
• Proceed with the procurement of network
solutions supply chain in a timely manner
54
Questions?
(for Suppliers only)
Wrap Up and Questions
Network Solutions Supply Chain (NSSC)
Collaborative Procurement Solutions Approach
Tom Mercer
Shared Services Canada
Manager
Procurement and Vendor Relationships Directorate
May 28, 2014
Collaborative Procurement Solutions Approach
Industry
Engagement
Day
Invitation to
Qualify (ITQ)
Review and
Refine
Refinements
(RRR)
Bid
Solicitation
Phase
Contract
Award
56
• The purpose is to qualify suppliers who have demonstrated
and proven skills and experience in implementing and
providing network solutions that will support the
transformation and maintenance of wired local area
networks (LANs) and wireless LANs (Wi-Fi) and other
supporting telecommunications equipment and services.
• Evaluation criteria will focus on the supplier’s capabilities
and experience to deliver NSSC services.
• Suppliers who meet the mandatory ITQ evaluation criteria
will be deemed successful “Qualified Respondents” (QRs)
and will proceed to the RRR phase.
• Canada will inform Qualified Respondents that, in the
“Review and Refine Requirements Phase”, a draft Statement
of Work (SOW) will be provided to them and at that time.
Invitation to Qualify (ITQ) Phase
57
Invitation
to Qualify
(ITQ)
• Canada will provide the Qualified Respondents
with a draft RFP(s).
• Canada will interact with Qualified
Respondents to seek feedback and clarification
on Canada’s requirements to refine the RFP(s)
(e.g. workshops, one-on-one sessions, Q’s and
A’s).
• A Supply Chain Security Information (SCSI)
assessment will also be started during this
stage.
Review and Refine Requirements (RRR)
Phase
58
Review and
Refine
Requirements
(RRR)
• Canada may issue one or more formal Request
for Proposal(s) (RFP(s)) to the Qualified
Respondents who have participated in the ITQ
and RRR Phases
• Each Qualified Respondent will be permitted to
formally bid on the requirements set out in the
RFP(s).
Bid Solicitation Phase
59
Bid
Solicitation
Phase
• Contract Award will occur after completion of
the Bid Solicitation Phase
• One or more contracts may be awarded
depending on the Request for Proposal(s)
Contract Award and Implementation
60
Contract
Award
6161
Cyber & Supply Chain Threats to the GC
Network Solutions Supply Chain
Industry Day
May 28, 2014
Brad McInnis
Communications Security Establishment
62
UNCLASSIFIED
62
CSE: What We Do
• CSE: Canada’s national cryptologic agency
• Our Mandate
– Foreign Signals Intelligence
– IT Security
– Support to Lawful Access
• ‘B’ Mandate
– To provide advice, guidance and services to help ensure the
protection of electronic information and of information
infrastructures of importance to the Government of Canada
63
UNCLASSIFIED
63
CSE: IT Security Program
• We help prevent, detect and defend against IT security
threats and vulnerabilities
• CSE provides unique technical expertise, capabilities
and classified information that we use to complement
commercial security technologies available to IT
security practitioners
• We use our own methods and operations to detect and
defend against threats that are not in the public domain
64
UNCLASSIFIED
64
Effects of Market Forces on Technology
• Market forces favour commercial and personal technologies over
requirements for security features
• Our society is almost totally dependent on software and hardware
commercial technology providers from global markets
• New products and new versions of products are rapidly produced
• No regulatory framework exists for hardware/software safety and security
• Traditional government policies and processes impose security
requirements after products and systems have been developed
• Few incentives for commercial technology developers to invest in security
65
UNCLASSIFIED
65
Technology Vulnerabilities
• “People write software sloppily. Nobody checks it for mistakes before it gets sold”
– Peiter Zatko (Mudge), WhiteHouse Cyber-Security Summit (2000)
• Unintentional vulnerabilities or weaknesses
– Design flaws
– Implementation errors
• Cyber Threat – A threat actor, using the Internet, takes advantage of a known
vulnerability in a product for the purpose of exploiting a network and the information
the network carries
• Intentional vulnerabilities or weaknesses
– Predetermined deliverables can be implanted in a product with or without knowledge of
company.
• Supply Chain Threat – a product can be easily tampered with in the supply chain
to later facilitate a cyber-intrusion against that product in order to exploit a network
and the information the network carries
66
UNCLASSIFIED
66
The Evolving Cyber-Threat
• Today, malicious cyber activities are directed against
Canada and our closest allies on a daily basis
• Threat actors range in sophistication from malfeasant
hackers to organized crime groups, to terrorists to
nation states
• Canadians trust the GC to defend Canada’s cyber
sovereignty and protect and advance our national
security and economic interests
67
UNCLASSIFIED
67
An Issue of National Security
• Risks from vulnerable technologies
– Covert and persistent access by cyber threat actors in GC departmental
networks threatens the sovereignty of GC information and the continuity of
government operations
– Cyber threat actors are effective at exploiting inter-connected network element
technologies and management systems used to administer and operate
network infrastructures (i.e. Mandiant APT1 Report)
• Risks from an overly complex and decentralized threat surface
– Consolidation of GC networks is a prerequisite for manageable cyber
protection & defence
– Security through obscurity is not a viable long-term strategy to deter cyber
threat actors
• Risks from the supply chain
– Increases opportunities for threat actors to circumvent GC cyber security
measures
– More difficult for the GC to detect and remediate
68
UNCLASSIFIED
68
GC Shared Services Procurements
• Shared Services Canada and CSE are working in partnership to eliminate
or significantly reduce risks to the GC from cyber threats & global supply
chain vulnerabilities
• CSE will provide follow-up briefings on supply chain risk mitigation to
interested suppliers for GC shared services
– Companies must be willing to sign a CSE non-disclosure agreement
to receive this information
• Security requirements for cyber-protection, cyber-defence and supply
chain risk mitigation must be met by suppliers in order to successfully bid
on GC shared services initiatives
– As the IT Security authority for the GC, CSE will seek long-term
partnerships with successful suppliers
– CSE will assist Shared Services Canada in the pedigree analysis of
supply chain information provided by respondents
• Examples of these requirements can be found on CSE’s website under
Technology Supply Chain Guidance
69
Supply Chain Integrity (SCI)
Network Solutions Supply Chain
Industry Engagement Day
May 28th, 2014
Simon Levesque
Sr. Director Planning and Design, Cyber and IT Security Transformation Program
70
 The purpose of the Supply Chain Security Information (SCSI) assessment
process is to ensure that no un-trusted equipment, software or services,
procured by SSC, are used to deliver and/or support GC services.
 Respondents must successfully pass the SCSI assessment process in
order to remain Qualified Respondents.
SCSI assessments are being applied consistently to SSC
procurement activities; as a result, we can count some of
these recent contracts as having verified Supply Chains:
Email Transformation Initiative, Managed Security Services,
Data Centre Consolidation, and others.
Nature of the SCI
71
SCI in Competitive Procurement
2nd
Rejection
SCI Authority reviews
SCSI in consultation with
Security Partners
Decision
by SCI
Authority
Debrief
session with
respondent
No
Yes
Rejected respondent has 10 calendar days to resubmit
revised equipment list
Receive Approval Letter
for pre-qualification
Qualified
Respondents are
accepted at the
next phase of
procurement
SCI determination &
pre-requisite National
Security Exception
1st
Rejection
Respondents provide Supply
Chain Security Information (SCSI)
Respondent
does not
qualify
Competitive
procurement starts
Competitive
procurement ends
Cross-check of lists
provided for SCI and
at implementation
72
Required Information from the Respondents
• Once the SOW is finalized, GC will request that the respondents provide their
Supply Chain Security Information. More specifically, when it applies, the GC will
be requesting the following detailed information:
1. List of equipment used to deliver the service (vendor, manufacturer, model
number, software load version).
2. List of subcontractors (names of companies and the location from where
these services are delivered).
3. Network diagram.
4. All of the above applies for sub-contractors and partners (sub-contractors
and their own sub-contractors). This should include all companies who will
be sub-contracted to provide equipment or services as part of the project.
73
On-going Supply Chain Integrity Auditing
Rejected supplier has to resubmit revised equipment list
On-going SCI
auditing from
the moment
the contract
has been
awarded until
it ends.
Internal threat evaluation can
lead to the
questionning/exclusion of
specific equipment/services
Supplier provides
amended Supply Chain
Security Information
(SCSI)
SCI Authority reviews
SCSI in consultation with
Security Partners
Decision
by SCI
Authority
No
Yes
Supplier receives
Amendment
Approval Letter
Procurement initiates
a debrief session with
the supplier and the
SCI Authority initiates
Recall procedures
and communicates
with Technical
Authorities to mitigate
SCI Authority monitors
threats and audits results
in consultation with
Security Partners
Threats
Identification
Yes
SCI Authority initiates a debrief session with the
supplier, initiates the Recall procedures and
communicates with Technical Authorities to mitigate
Networks Solutions Supply Chain
Industry Day
Questions & Answers
Networks Solutions Supply Chain
Industry Day
Recap / Closing Remarks

More Related Content

What's hot

Keith Larkin Resume
Keith Larkin ResumeKeith Larkin Resume
Keith Larkin Resume
larkink
 
Jeremiah_Goodmancurrentresume
Jeremiah_GoodmancurrentresumeJeremiah_Goodmancurrentresume
Jeremiah_Goodmancurrentresume
Jeremiah Goodman
 
resume-latest 14022016
resume-latest 14022016resume-latest 14022016
resume-latest 14022016
Sham Ramlee
 
Naseem Asif Holger
Naseem Asif  HolgerNaseem Asif  Holger
Naseem Asif Holger
Carl Ford
 
Rorotika Self-Organising Network Solution (SON)
Rorotika Self-Organising Network Solution (SON)Rorotika Self-Organising Network Solution (SON)
Rorotika Self-Organising Network Solution (SON)
Frans_Joubert
 
Whitepaper nfv sdn-available-now
Whitepaper nfv sdn-available-nowWhitepaper nfv sdn-available-now
Whitepaper nfv sdn-available-now
milao999
 
CV - S.Saravanan Mudaliar (Network Planning & GIS)
CV - S.Saravanan Mudaliar (Network Planning & GIS)CV - S.Saravanan Mudaliar (Network Planning & GIS)
CV - S.Saravanan Mudaliar (Network Planning & GIS)
Saravanan Mudaliar
 
Data Center Design Guide 4 2
Data Center Design Guide 4 2Data Center Design Guide 4 2
Data Center Design Guide 4 2
Fiyaz Syed
 
Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4
danieljimmie
 
Resume for Gary Grathen
Resume for Gary GrathenResume for Gary Grathen
Resume for Gary Grathen
Gary Grathen
 

What's hot (19)

Keith Larkin Resume
Keith Larkin ResumeKeith Larkin Resume
Keith Larkin Resume
 
Ngn Technologies Company Profile
Ngn Technologies Company ProfileNgn Technologies Company Profile
Ngn Technologies Company Profile
 
Performance Measurement 02
Performance Measurement 02Performance Measurement 02
Performance Measurement 02
 
141015 iNSAF intro
141015 iNSAF intro141015 iNSAF intro
141015 iNSAF intro
 
Kiran_CV
Kiran_CVKiran_CV
Kiran_CV
 
Jeremiah_Goodmancurrentresume
Jeremiah_GoodmancurrentresumeJeremiah_Goodmancurrentresume
Jeremiah_Goodmancurrentresume
 
resume-latest 14022016
resume-latest 14022016resume-latest 14022016
resume-latest 14022016
 
Himani_Yadav
Himani_YadavHimani_Yadav
Himani_Yadav
 
120612 nettraxslides
120612 nettraxslides120612 nettraxslides
120612 nettraxslides
 
Naseem Asif Holger
Naseem Asif  HolgerNaseem Asif  Holger
Naseem Asif Holger
 
Rorotika Self-Organising Network Solution (SON)
Rorotika Self-Organising Network Solution (SON)Rorotika Self-Organising Network Solution (SON)
Rorotika Self-Organising Network Solution (SON)
 
Whitepaper nfv sdn-available-now
Whitepaper nfv sdn-available-nowWhitepaper nfv sdn-available-now
Whitepaper nfv sdn-available-now
 
CV - S.Saravanan Mudaliar (Network Planning & GIS)
CV - S.Saravanan Mudaliar (Network Planning & GIS)CV - S.Saravanan Mudaliar (Network Planning & GIS)
CV - S.Saravanan Mudaliar (Network Planning & GIS)
 
Data Center Design Guide 4 2
Data Center Design Guide 4 2Data Center Design Guide 4 2
Data Center Design Guide 4 2
 
Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4Genesis Networks Mar 2010 Base Presentation Rev4
Genesis Networks Mar 2010 Base Presentation Rev4
 
Resume for Gary Grathen
Resume for Gary GrathenResume for Gary Grathen
Resume for Gary Grathen
 
Ccna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 AnswersCcna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 Answers
 
Nortel converged office introduction1
Nortel converged office introduction1Nortel converged office introduction1
Nortel converged office introduction1
 
Main projects handled during 2015
Main projects handled during 2015Main projects handled during 2015
Main projects handled during 2015
 

Viewers also liked

Human Resource Management as a Strategic Business Partner
Human Resource Management as a Strategic Business PartnerHuman Resource Management as a Strategic Business Partner
Human Resource Management as a Strategic Business Partner
Philip Portelance
 
Introduction to human resource management
Introduction to human resource managementIntroduction to human resource management
Introduction to human resource management
Tanuj Poddar
 

Viewers also liked (13)

Talent Supply Chain in Professional Services
Talent Supply Chain in Professional ServicesTalent Supply Chain in Professional Services
Talent Supply Chain in Professional Services
 
Human Resource Management as a Strategic Business Partner
Human Resource Management as a Strategic Business PartnerHuman Resource Management as a Strategic Business Partner
Human Resource Management as a Strategic Business Partner
 
Upcoming Trends in Supply Chain Solutions - Robert de Laat (Logic Factory)
Upcoming Trends in Supply Chain Solutions - Robert de Laat (Logic Factory)Upcoming Trends in Supply Chain Solutions - Robert de Laat (Logic Factory)
Upcoming Trends in Supply Chain Solutions - Robert de Laat (Logic Factory)
 
The Supply Chain of Talent
The Supply Chain of TalentThe Supply Chain of Talent
The Supply Chain of Talent
 
Business Continuity In The Supply Chain - 20121009
Business Continuity In The Supply Chain - 20121009Business Continuity In The Supply Chain - 20121009
Business Continuity In The Supply Chain - 20121009
 
Global Trade - International Business
Global Trade - International BusinessGlobal Trade - International Business
Global Trade - International Business
 
Designing the supply chain network
Designing the supply chain networkDesigning the supply chain network
Designing the supply chain network
 
Launching Next-Generation Supply Chain Leader Training by Supply Chain Insights
Launching Next-Generation Supply Chain Leader Training by Supply Chain InsightsLaunching Next-Generation Supply Chain Leader Training by Supply Chain Insights
Launching Next-Generation Supply Chain Leader Training by Supply Chain Insights
 
Basic of Human Resource Management
Basic of Human Resource ManagementBasic of Human Resource Management
Basic of Human Resource Management
 
Human resource management ppt
Human resource management ppt Human resource management ppt
Human resource management ppt
 
Supply Chain Management, Designing the Supply Chain Network
Supply Chain Management, Designing the Supply Chain NetworkSupply Chain Management, Designing the Supply Chain Network
Supply Chain Management, Designing the Supply Chain Network
 
Supply Network Design Lecture 5
Supply Network Design Lecture 5Supply Network Design Lecture 5
Supply Network Design Lecture 5
 
Introduction to human resource management
Introduction to human resource managementIntroduction to human resource management
Introduction to human resource management
 

Similar to Network Solutions Supply Chain Industry Day_May28_2014_Consolidated

CV2015_06_30 -NG van Zyl
CV2015_06_30 -NG van ZylCV2015_06_30 -NG van Zyl
CV2015_06_30 -NG van Zyl
Gerhard van Zyl
 
Ons Corporate Presentation 2009
Ons Corporate Presentation 2009Ons Corporate Presentation 2009
Ons Corporate Presentation 2009
Taralee
 
Erik Franzen Linkedin Resume
Erik Franzen Linkedin ResumeErik Franzen Linkedin Resume
Erik Franzen Linkedin Resume
Erik Franzen
 
TuanVu_CiscoNetworkEngineer
TuanVu_CiscoNetworkEngineerTuanVu_CiscoNetworkEngineer
TuanVu_CiscoNetworkEngineer
Tuan Vu
 
Rajeev Bajpai_resume
Rajeev Bajpai_resumeRajeev Bajpai_resume
Rajeev Bajpai_resume
Rajeev Bajpai
 
CIC Backhaul Development Short 3 9 2010
CIC Backhaul Development Short 3 9 2010CIC Backhaul Development Short 3 9 2010
CIC Backhaul Development Short 3 9 2010
CIC
 

Similar to Network Solutions Supply Chain Industry Day_May28_2014_Consolidated (20)

2014 sept-9-shared-services-canada
2014 sept-9-shared-services-canada2014 sept-9-shared-services-canada
2014 sept-9-shared-services-canada
 
Updates on NFV and SDN Activities from the Broadband Forum
Updates on NFV and SDN Activities from the Broadband ForumUpdates on NFV and SDN Activities from the Broadband Forum
Updates on NFV and SDN Activities from the Broadband Forum
 
Converged Broadband Services Fulfillment-Delivered
Converged Broadband Services Fulfillment-DeliveredConverged Broadband Services Fulfillment-Delivered
Converged Broadband Services Fulfillment-Delivered
 
How network operators improve their efficiency and prepare for market consoli...
How network operators improve their efficiency and prepare for market consoli...How network operators improve their efficiency and prepare for market consoli...
How network operators improve their efficiency and prepare for market consoli...
 
July 9 ssc_gc_net_wan_service_industry_day_slides
July 9 ssc_gc_net_wan_service_industry_day_slidesJuly 9 ssc_gc_net_wan_service_industry_day_slides
July 9 ssc_gc_net_wan_service_industry_day_slides
 
Workplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) InitiativeWorkplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) Initiative
 
Mike najarian resume
Mike najarian resumeMike najarian resume
Mike najarian resume
 
Project Manager - PMP [Resume]
Project Manager - PMP [Resume]Project Manager - PMP [Resume]
Project Manager - PMP [Resume]
 
CV2015_06_30 -NG van Zyl
CV2015_06_30 -NG van ZylCV2015_06_30 -NG van Zyl
CV2015_06_30 -NG van Zyl
 
2014 june-11-transformation-plan-update-en
2014 june-11-transformation-plan-update-en2014 june-11-transformation-plan-update-en
2014 june-11-transformation-plan-update-en
 
Lars-Ole Slot CV EN
Lars-Ole Slot CV ENLars-Ole Slot CV EN
Lars-Ole Slot CV EN
 
Ons Corporate Presentation 2009
Ons Corporate Presentation 2009Ons Corporate Presentation 2009
Ons Corporate Presentation 2009
 
Erik Franzen Linkedin Resume
Erik Franzen Linkedin ResumeErik Franzen Linkedin Resume
Erik Franzen Linkedin Resume
 
ROUTE module 1
ROUTE module 1ROUTE module 1
ROUTE module 1
 
Ravindra pujari
Ravindra pujariRavindra pujari
Ravindra pujari
 
TuanVu_CiscoNetworkEngineer
TuanVu_CiscoNetworkEngineerTuanVu_CiscoNetworkEngineer
TuanVu_CiscoNetworkEngineer
 
Kelly Howard Resume_10_2015
Kelly Howard Resume_10_2015Kelly Howard Resume_10_2015
Kelly Howard Resume_10_2015
 
Wireline-Engineering-Solutions-for-a-Leading-Broadband-Provider.pdf
Wireline-Engineering-Solutions-for-a-Leading-Broadband-Provider.pdfWireline-Engineering-Solutions-for-a-Leading-Broadband-Provider.pdf
Wireline-Engineering-Solutions-for-a-Leading-Broadband-Provider.pdf
 
Rajeev Bajpai_resume
Rajeev Bajpai_resumeRajeev Bajpai_resume
Rajeev Bajpai_resume
 
CIC Backhaul Development Short 3 9 2010
CIC Backhaul Development Short 3 9 2010CIC Backhaul Development Short 3 9 2010
CIC Backhaul Development Short 3 9 2010
 

More from KBIZEAU

Pablo sobrino smart-dps presentation to itac - march 4-2014 - english
Pablo sobrino   smart-dps presentation to itac - march 4-2014 - englishPablo sobrino   smart-dps presentation to itac - march 4-2014 - english
Pablo sobrino smart-dps presentation to itac - march 4-2014 - english
KBIZEAU
 
SSC PSAB Policy w/Multiyear Performance Objectives
SSC PSAB Policy w/Multiyear Performance ObjectivesSSC PSAB Policy w/Multiyear Performance Objectives
SSC PSAB Policy w/Multiyear Performance Objectives
KBIZEAU
 

More from KBIZEAU (20)

Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
 
Review of the Collaborative Procurement Process
Review of the Collaborative Procurement ProcessReview of the Collaborative Procurement Process
Review of the Collaborative Procurement Process
 
Delivering Public Sector Innovation
Delivering Public Sector InnovationDelivering Public Sector Innovation
Delivering Public Sector Innovation
 
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
 
Government of Canada Integrated IT Planning Presetation
Government of Canada Integrated IT Planning PresetationGovernment of Canada Integrated IT Planning Presetation
Government of Canada Integrated IT Planning Presetation
 
Hill timesarticle sharedservicescanada
Hill timesarticle sharedservicescanadaHill timesarticle sharedservicescanada
Hill timesarticle sharedservicescanada
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-en
 
Itir oct0714-afac report-en
Itir oct0714-afac report-enItir oct0714-afac report-en
Itir oct0714-afac report-en
 
Ssac summary-report-2014-en
Ssac summary-report-2014-enSsac summary-report-2014-en
Ssac summary-report-2014-en
 
Transformation overview-final-oct-7-2014
Transformation overview-final-oct-7-2014Transformation overview-final-oct-7-2014
Transformation overview-final-oct-7-2014
 
Ssac summary-report-2014-en
Ssac summary-report-2014-enSsac summary-report-2014-en
Ssac summary-report-2014-en
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014
 
Ssc 2014 2015 integrated business plan
Ssc 2014 2015 integrated business planSsc 2014 2015 integrated business plan
Ssc 2014 2015 integrated business plan
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2
 
2014 june-11-update-on-ssc-priorities-and-activities-en
2014 june-11-update-on-ssc-priorities-and-activities-en2014 june-11-update-on-ssc-priorities-and-activities-en
2014 june-11-update-on-ssc-priorities-and-activities-en
 
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
 
Shared Services Canada - Reports on Plans and Priorities 2014-2015
Shared Services Canada - Reports on Plans and Priorities 2014-2015Shared Services Canada - Reports on Plans and Priorities 2014-2015
Shared Services Canada - Reports on Plans and Priorities 2014-2015
 
Pablo sobrino smart-dps presentation to itac - march 4-2014 - english
Pablo sobrino   smart-dps presentation to itac - march 4-2014 - englishPablo sobrino   smart-dps presentation to itac - march 4-2014 - english
Pablo sobrino smart-dps presentation to itac - march 4-2014 - english
 
SSC PSAB Policy w/Multiyear Performance Objectives
SSC PSAB Policy w/Multiyear Performance ObjectivesSSC PSAB Policy w/Multiyear Performance Objectives
SSC PSAB Policy w/Multiyear Performance Objectives
 
Future Role of the CIO
Future Role of the CIO Future Role of the CIO
Future Role of the CIO
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Network Solutions Supply Chain Industry Day_May28_2014_Consolidated

  • 1. 1 May 28, 2014 TELECOMMUNICATIONS TRANSFORMATION PROGRAM Network Solutions Supply Chain Industry Day
  • 2. 2 Network Solutions Supply Chain Industry Day Industry Day Objectives • Share Telecommunications Transformation plans with industry suppliers and engage in a dialogue regarding Network Solutions Solutions Supply Chain • Explain the proposed “Collaborative Procurement Solutions” approach • Address the Cyber Security Supply Chain Threat • Elicit written feedback from suppliers on the questions posed during this presentation
  • 3. 3 Network Solutions Supply Chain Industry Day Agenda TIME PRESENTER DESCRIPTION 1:00 - 1:05 pm John Dullaert Director, Telecommunications Transformation Program, Shared Services Canada (SSC) Opening Remarks and Industry Day Objectives 1:05 – 1:35 pm Benoît Long SADM, Transformation, Service Strategy and Design, SSC SSC Transformation Overview 1:35 - 2:30 pm Michel Fortin DG, Telecommunications Transformation Program, SSC Network Solutions: Overview, High Level Requirements and Discussion Topics 2:30 – 2:35 pm Break 2:35 – 3:20 pm Michel Fortin DG, Telecommunications Transformation Program, SSC Network Solutions: Key Questions 3:20 – 3:50 pm Tom Mercer Manager, Telecommunications Systems Division, Procurement and Vendor Relationships, SSC Collaborative Procurement Solutions Approach 3:50 – 4:20 pm Brad McInnis Security Strategic Relationships Office, Communications Security Establishment Canada Simon Levesque Sr. Director Planning and Design, Cyber and IT Security Transformation Program, SSC Supply Chain Security Information Assessment (SCSI) 4:20 – 4:50 pm John Dullaert Director, Telecommunications Transformation Program, SSC Questions and Answers, Recap / Closing Remarks
  • 4. 4 May 28, 2014 TELECOMMUNICATIONS TRANSFORMATION PROGRAM Network Solutions Supply Chain (NSSC) Industry Day Shared Services Canada (SSC) Transformation Overview Benoit Long Senior Assistant Deputy Minister Transformation, Service Strategy & Design Shared Services Canada
  • 5. 5 SSC Transformation Overview Agenda • Industry Day Objectives • SSC Transformation Objectives and Purpose • Transformation Timeline • Transformation Phased Approach • Current State • Target End State • Business and Functional Requirements • Engagement • Wrap up
  • 6. 6 SSC Transformation Overview Purpose of Industry Day • To provide background on telecommunications transformation with a focus on Intra-building Local Area Network transformation • To continue a dialog with Industry to learn what are the best and most innovative options available in the market today that will support the Government of Canada’s requirements for developing a Network Solutions Supply Chain – Obtain industry input on the strategy for developing a comprehensive strategy for transforming Intra-building Local Area Networks while maintaining the existing environment – Advice that could lead to better pricing (based on past experience) – Address questions regarding process – Set the stage for the supplier written responses
  • 7. 7 SAVINGS Transformation will match service levels to partner priorities SECURITY Transformation will realize material cost savings and avoid future costs SERVICE Transformation will provision a secure environment to meet program needs SSC Transformation Overview Transformation Objectives
  • 8. 8 EMAIL DATA CENTRE NET- WORK WORK- PLACE TECHNOLOGY DEVICES One Email Solution Objective: Migrate the GC to a single, outsourced, secure email system Objective: Consolidate the GC’s 485 data centres into 7 modern and efficient facilities A government-wide footprint of 7 data centres Consolidated procurement of end- user device hardware and software Objective: Consolidate procurement of end- user devices & related software A single government-wide telecommunications network Objective: Streamline and modernize the GC’s telecommunications infrastructure and services SSC Transformation Overview Purpose of Transformation SSC will transform the GC’s aging IT infrastructure by delivering:
  • 9. 9 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 SSC Transformation Overview Timeline FY 13/14 FY 14/15 FY 15/16 FY 18/19 FY 19/20 NET - WORKS Contract Awards Migration Complete DATA CENTRE Centre de Données de l’ouest du Quebec/ Development 1 Complete Production 2 Established Macdonald-Cartier Data Centre / Development 2 Refurbishment Complete Borden/Production 1 Expansion Complete Borden / Production 1 Interim Established Production 4 Established Production 3 Established Building-by building migration begins CYBER & IT SECURITY FY 16/17 FY 17/18 Security Operations Centre Release 1 Network Security Transformation Plan Security Operations Centre Release 2 Security Operations Centre Release 3 PRODUCTION DEVELOPMENT SCIENTIFIC Science Data Centre Replacement Complete GCNET WAN WIFI/LAN VIDEOCONF. (BOARDROOMS) GC Service 1.0 Established (ongoing service improvements; releases as required) GC Commitments Fulfilled Strategy for Multi-Tenant buildings Pilot Complete Managed Security Service Contract Award CYBER SECURITY IT SECURITY GC SECRET INFRASTRUCTURE Supercomputing Consolidation Complete Migration CompleteBuilding-by building migration begins Migration to enterprise services (Contact Centre Infrastructure and Toll Free Services) CONTACT CENTRE Migration CompleteContract Award(s) Consolidation Complete Data Centre supply chain established Contract Award WORKPLACE COMMS Migration CompleteBuilding-by building migration begins Software Service Design Hardware Service Design Software Sourcing Strategy Hardware Sourcing Strategy PROVISIONING SERVICES WORKPLACE TECHNOLOGY SERVICES Initiate & Develop Pilots Pilots Incremental Transition to Enterprise EMAIL & BB10 Contract Award Wave 0 Wave 1 Wave 2 Wave 3 EMAIL BB10 Execute in Waves (Break/Fix) BB10 rollout complete Migration Release 1 (tactical) Release 2 – C5 Upgrade Release 3 – Implementation Pilot (SSC, TBS, Foreign Affairs and Trade Development Canada GC Service 2.0 WORKPLACE TECHNOLOGY DEVICES
  • 10. 10 Overall Approach Pre- Planning Planning Execution STEP 3 - PLANNING • Define organization structure • Define migration and receiving teams • Develop HR Management and Talent Plans • Project-ize by priority • Align network consolidation plan with data centre and application migration requirements STEP 2 - PRE-PLANNING • Produce detailed current state / asset and application information • Develop detailed partner requirements – Business cycles – Application refresh plans – Overall readiness • Define all Data Centre and Telecom Services • Develop Consolidation Priority List (CPL) • Conduct Procurement (including P3, etc.) STEP 1 - ESTABLISH OVERALL APPROACH • Produce Reference Architecture • Establish Core Services roadmap • Develop “Migration Factory” approach • Define consolidation sequence – Competing factors • Determine sourcing strategies • Develop security by design STEP 4 - EXECUTION • Establish enterprise data centres and GC Network • Build new operations organization • Establish all ITSM tools and processes • Build migration and receiving teams • Perform quality control • Assist partners in the migration of all business applications • Install and configure new infrastructure • Close (“shred”) data centres as they are vacated Core Foundation Services in Place SSC Transformation Overview Transformation Phased Approach
  • 11. 11 LAN1 – Dept. A LAN5 – Dept.Q LAN4 – Dept H LAN3 – Dept.F LAN2 – Dept. B LAN7 LAN4 000 LAN5 – Dept. Q LAN4 – Dept. H LAN7 LAN6 Dept. A: small data centre LAN2 – Dept. B LAN7 LAN6 Dept. H: small data centre Dept. F: small data centre LAN3 999 LAN7 LAN6 50 wide area networks (WAN) LAN6 SSC Transformation Overview Current State of Buildings, Networks and Data Centres Dept. F: small data centre … Dept. A: large data centre Dept. Q: small data centre Dept. B: small data centre Dept. D: small data centre … WAN2WAN1 WAN 50WAN3
  • 12. 12 SSC Transformation Overview Target End State SECURITY • All departments share one enterprise/common zone • Access to sensitive departmental data is secured through restricted zones • Developers do not have access to production infrastructure • Classified information below Top Secret • Consolidated, controlled, secure perimeters • Balance security and consolidation • Certified and Accredited infrastructure CHARACTERISTICS • Integrated (single, common, secure GC network will link all service delivery points) • High performance • Secure • Cost-effective • Standardized (based on open standards, modularized design) • Mobile (wireless technology will be maximized where cost-effective) • Responsive and resilient CONSOLIDATION PRINCIPLES 1. As few wide area networks as possible 2. All departments share network access in multi- tenant buildings 3. Network equipment is shared 4. Telecom hubs (call managers, VC bridges) located in enterprise data centres or common points of presence 5. Inter-data centre connections should be diverse and fully redundant 6. Scalable and flexible infrastructure 7. Performance levels should be similar wherever possible 8. Contracts/services will be consolidated BUSINESS INTENT • Business to Government • Government to Government • Citizens to Government
  • 13. 13 SSC Transformation Overview Business Requirements • Support a wide variety of federal government programs and applications ranging from corporate file stores and routine data exchanges, to real-time government-wide mission-critical military, policy, health and public safety information • Enterprise infrastructure and service management to eliminate silos and facilitate interoperability across departments and agencies • Reduce duplication and inefficiencies • Ensure high availability for mission critical applications • Standardize service levels to ensure a consistent delivery and availability of Data Centre services across all SSC partners and agencies • Built-in, on-going competition to ensure best value, continuous improvement and innovation of services • Security: Supply must meet the Trusted Supply Chain Requirements (identified in the “Supply Chain Integrity” presentation to follow)
  • 14. 14 • Supplier diversity for Local Area Networks • Open standards to allow for workload mobility / portability across suppliers • Certified compliance and compatibility with SSC reference architectures • Must support self-service / self-provisioning of local area network services • Must support just-In-time capacity • Frequent market checks to take advantage of technology, economic or market shifts • Provisions for annual price competition to ensure best value to Canada • Must support a secure, multi-tenant environment (GC Domains and Zones) SSC Transformation Overview Functional Requirements
  • 15. 15 SSC Transformation Overview Telecom Transformation Program Conceptual Framework Operations (People, Process, Technology) Intra-building Network Internet Connectivity ITServiceManagement Network and Cyber Security Operations Centre Inter-building Network Intra-Data Centre Networks Inter-Data Centre Networks Voice, Video, Instant Messaging, Presence and Conferencing Services ProgramManagement NetworkSecurity IT Services Contact Centre Infrastructure Services CONVERGED COMMUNICATIONS (Application Layer) NETWORKS (Transport Layer) FRAMEWORK ELEMENTS
  • 16. 16 INTERNET EnhancedEnterpriseSecurity Telecom Components in a Building… INTRA-BUILDING NETWORK (LAN / WIFI) INTER-DATA CENTRE NETWORK INTRA-DATA CENTRE NETWORK • Network Switches • Cables • Routers • Etc... BUILDING A GC NETWORK 377 000 users 3 000+ sites SSC Transformation Overview Telecom Transformation Program Components
  • 17. 17 SSC Transformation Overview Engagement - IT Infrastructure Roundtable and Advisory Committees • SSC recognizes the value and contribution of the Information and Communications Technology (ICT) sector, and the important role that sector can play in the transformation of the Government of Canada’s IT infrastructure • The ITIR is a forum that SSC uses to harness the benefits of a diverse and innovative supplier community to build a secure, lower-cost, more effective technology platform for the Government of Canada • ITIR discussions focus on the government’s long term IT transformation agenda, emerging technologies in the marketplace, and first-use technologies
  • 18. 18 SSC Transformation Overview Network Solutions Supply Chain - Engaging Industry for Feedback • SSC also engages industry for feedback throughout the collaborative procurement process, which will result in: – A balance of industry capability with cost effectiveness – Provide suppliers with the opportunity to share their knowledge with the Government of Canada on key discussion topics – Allow for an exchange of information through written response with telecommunications experts that will ultimately inform telecommunications transformation strategies and procurement planning SOLICITATIONINDUSTRY ENGAGEMENT INVITATION TO QUALIFY (ITQ) REVIEW/REFINE REQUIREMENTS (RRR) IMPLEM. PHASES OF THE COLLABORATIVE PROCUREMENT PROCESS
  • 19. 19 Questions? (for suppliers only) SSC Transformation Overview Wrap Up and Questions
  • 20. 20 Michel Fortin Director General Telecommunications Transformation Program Transformation, Service Strategy and Design May 28 2014 TELECOMMUNICATIONS TRANSFORMATION PROGRAM Network Solutions Supply Chain (NSSC) Industry Day Overview
  • 21. 21 Objectives of Industry Engagement Support intra-building network transformation of wired and wireless (Wi-Fi) infrastructure and services 1. Maintain the existing network equipment and services as transformation proceeds • Highlight strategies and considerations for future service provision of these services – Strategies for Procurement Vehicles (sourcing and supply methods) – Consolidation and Migration Strategies – Bundling of products/solutions/services – Consideration for including additional services • Solicit input and feedback on key questions 1 2 • Determine the best strategy / approach to :
  • 23. 23 Strategic Context  SSC will be transforming network infrastructure in buildings at more than 3,580 sites nationally and internationally INTRA-BUILDING CURRENT STATE 3580+ Sites 495 multi-tenant buildings (61 “large” buildings (1000+ pop) ) 4000+ Local Area Networks
  • 24. 24 CABLING SERVICE • Wired infrastructure – will continue to be required for vertical cabling, data centres, wireless access points and connections requiring wiring The components of the Intra-building network transformation are: Intra-building Network Components In scope for Network Solutions Supply Chain (NSSC) Out of scope for NSSC WIRED LAN SERVICE • Shared and modernized infrastructure at 495 multi-tenant buildings will be consolidated • Simplified support and management WIFI NETWORK & SERVICE • Improved employee mobility / productivity & supports Blueprint 2020 • Supports voice, video and data • 80% of user will have WiFi access by 2020
  • 25. 25 The Network Equipment Support Services (NESS) standing offer is used to procure new network equipment and support services (including a one-year warranty and optional installation) from qualified offerors for the following classes of equipment: Note: Class 4.0 Firewall was deleted and is incorporated within 8 Current State – Network Equipment Support Services LAN Switches1.0 Routers2.0 Layer 4-7 Devices (application switches) 3.0 Intrusion Detection Systems5.0 VPN Appliances6.0 Optical Networking Devices7.0 Multi Class Equipment (unified threat management network equipment) 8.0 Wireless Systems9.0 Intrusion Prevention System10.0 Uninterruptible Power Supply11.0 Common Requirements (across all classes) 12.0
  • 26. 26 • Network Infrastructure Management Services (NIMS) standing offer is used to procure the maintenance of network hardware and software in the following areas: Current State – Network Infrastructure Management Services REPLACEMENT: Offeror is required to acquire and deliver the replacement component to a technical contact in an identified timeframe ON-SITE REPLACEMENT: Offeror is required to acquire / deliver and install the replacement component on-site or undertake whatever maintenance and repair service that is necessary to restore the product to operational service RETURN TO DEPOT: Offeror is required to receive the faulty product, repair or replace the product and ship the repaired or replaced product back to the site – IT Security Equipment – Application / Software – Specialized Device • Maintenance services include the necessary hardware, software and resource support for the fault restoration, ongoing functional operation and preventative maintenance of products; 3 types of maintenance plans: – Network Equipment – Multi-Functional Devices 1 2 3
  • 27. 27 Target State - Building View Typical Building Profile General profile • Combination of wireless and wired infrastructure • Some buildings will have SECRET systems (require more cabling and limit WiFi) • Multi-tenant buildings will share network equipment • VoIP (hard and soft phones) and/or cellular/smartphones • Desktop videoconferencing • Sharable VC rooms
  • 28. 28 KEY CHALLENGES Key Challenges – Network Solutions • Existing NESS does not support transformation well because it is equipment-specific as opposed to solutions oriented • Too many different items in the catalogue • Interoperability is challenging between multiple OEMs (ie. OEMs implement customized “open standards” which are not always interoperable with other OEMs without loss of functionality) • Standards are used differently across many networks • Consolidation of partner / business domains with differing security and privacy considerations • Support to remote and international locations • Executing transformation while maintaining the existing infrastructure and services
  • 29. 29 GUIDING PRINCIPLES Guiding Principles – Network Solutions • Technology based open architecture and industry standards to ensure flexibility and interoperability between existing and future services • Must be scalable and future-proof (e.g. support Software Defined Network framework) • Must support multi-tenancy (traffic isolation differentiated by partner) and secure, controlled access to data • Must support centralized management, configuration and reporting • Must ensure information is handled using the appropriate controls, protocols and infrastructure to support the required level of security • Network must support a self-serve model for data centre services • Provide best value and total cost of ownership (TCO) for the operations and management of services
  • 31. 31 CURRENT STATE Maintaining Existing Network Services and Equipment • To ensure ongoing support of GC Department and agencies, the existing network infrastructure must be maintained during transformation • Existing supply arrangements (e.g. NESS) are used to maintain existing network and IT security infrastructure (including Top Secret) • Supply arrangements support all of Government of Canada • Ongoing requirement to procure network and IT security products and services • NESS and NIMS will be replaced with procurement vehicles which will support transformation
  • 32. 32 • Provide the ability to procure the following classes of network products/components and/or services: High Level Requirements – Optical Networking Devices – Network Monitoring and Management – Specialized Networking – Wired Switches – Wireless Networking – Routers – Application Delivery Networking Products – Firewalls, including Deep Packet Inspection – Forward and Reverse Proxy – Intrusion Detection and Prevention, including network, host & wireless – URL and Content Filtering, including whitelisting, blacklisting – Anti-Virus / Malware / Spyware – Anti-Spam / Anti-Phishing – Link Layer Security/VPN (IPSec, SSL, TLS) – Data Loss Prevention – Vulnerability Assessments – Network Forensics & Analysis
  • 33. 33 Considerations Ensure support for: • Varying service levels across SSC partners and clients • Partner and client specific Security Requirements (e.g. Public Safety, Correctional Services, National Security) • High availability and fault tolerant standards must be maintained, with minimal downtime for maintenance schedules, to ensure continuous levels of service for mission critical applications • Network Access Control, Network Encryption Layers, Network Policy Management • Virtualized environments • Malware execution in Advanced Persistent Threat Detection (APTD),including detection of DNS-based malware CONSIDERATIONS
  • 34. 34 KEY DISCUSSION TOPICS AND QUESTIONS FOR INDUSTRY FEEDBACK
  • 35. 35 SSC is trying to determine the strategy that will provide the best value and lowest total cost of ownership (TCO) for the GC to deliver transformed Intra-Building network services while maintaining existing network services and providing standard levels of service. Factors to consider for Procurement Vehicles: Strategies for Procurement Vehicle • Out-source (fully managed) • Hybrid • In-Source • Supply Arrangement (SA) • Standing Offer (SO) • Contract • Worldwide • By region • Varies by site • Buy • Lease • Bundled with services VARIATION BY GEOGRAPHY? • Nationally/ Worldwide • By region • Varies by site • One for all categories • One per category (LAN, WiFI, etc.) VARIATION BY OEM ? SOURCING STRATEGY: SUPPLY METHOD:A B C SUPPLIER STRATEGY: D PRODUCT (HW/SW) SOURCING METHOD: E PROCUREMENT CONSIDERATIONS 1 Discussion Topic
  • 36. 36 Design and deliver the solution by in-house SSC resources using SSC acquired infrastructure components SSC in-house resources deliver parts of the service on GC-owned infrastructure while the remainder is delivered by a third party vendor Sourcing Strategy Outsourced / Fully Managed Co-Managed / Hybrid 1. What are the benefits, technical challenges, requirements and recommended pricing model for successful deployment and ongoing support of each deployment model? 2. Which sourcing strategy would you recommend? In-sourced / In-House EXAMPLE: Vendor A provides the design, Vendor B provides the equipment / infrastructure and SSC in- house resources operate EXAMPLE: Buy the equipment / infrastructure, and SSC in-house resources build and operate solutions Third parties design, provide and operate the solution(s) through a managed service EXAMPLE: Vendor provides the end-to-end network solution based on the requirements provided A 1 Discussion Topic
  • 37. 37 1. What supply methods would you recommend to support intra- building network transformation, and why? 2. If contract, what contract period would you recommend ? Supply Method • An offer from a potential supplier to provide goods and / or services at pre- arranged prices, under set terms and conditions, when and if required • Not a contract until the government issues a "call- up" against the standing offer. • The government is under no actual obligation to purchase until that time • A method of supply to procure goods and services • Not a contract and neither party is legally bound as a result of signing a supply arrangement alone • Includes a set of predetermined conditions that will apply to bid solicitations and resulting contracts • Allows government to solicit bids from a pool of pre-qualified suppliers for specific requirements • A voluntary, deliberate, and legally enforceable agreement between two or more competent parties • Each party to a contract acquires rights and duties relative to the rights and duties of the other parties Source: “An Introduction to procurement “manual and https://buyandsell.gc.ca/ B Contract Standing Offer Supply Arrangement 1 Discussion Topic
  • 38. 38 1. Which supplier strategy would you recommend?: (ie. a single supplier nationally, by region or by site? or continuation of a model with potentially varying resellers/OEMs for each procurement of products? 2. What are the pros and cons of each option? Supplier Strategy One prime supplier to transform all sites worldwide SUPPLIER BY REGION WORLDWIDE/NATIONAL Suppliers will transform the sites within respective regions SUPPLIER BY SITE Allows suppliers to vary by site based on site requirements and complexity (e.g. small, medium, large sites) C A site could be: • Campus • Military base • DCN • Remote sites • Etc. 1 Discussion Topic
  • 39. 39 Sourcing Method There are various sourcing methods available including leasing/procuring managed services, buying or leasing products with in-house services: 1. Which categories do you recommend that we lease services rather than buy/lease products and perform services in-house? 2. In the case that products are acquired do you recommend that they be bought or leased? Why? 3. What are the pros and cons of each option: buy vs. lease vs. bundle with services? D BUY PRODUCTS ? LEASE PRODUCTS? BUNDLE PRODUCTS WITH SERVICES? (BUY ENTIRE SOLUTIONS) vs vs 1 Discussion Topic LEASE SERVICES vs
  • 40. 40 Products/solutions can be procured or leased from a single or multiple OEMs: 1. For each service category (eg. Wired LAN, WiFi, etc), do you recommend that products/solution sets be procured entirely from the same original equipment manufacturer(OEM)? 2. In the case of multiple OEMs, which types of solutions/products (eg. LAN switches, routers, etc) will be easy/challenging to integrate between various manufacturers’ products? Which industry standards should be adopted to improve interoperability? Procurement – OEM ConsiderationsE SINGLE ORIGINAL EQUIPMENT MANUFACTURER (OEM) (“UNIFORM”) BY SERVICE CATEGORY vs 1 Discussion Topic MULTIPLE ORIGINAL EQUIPMENT MANUFACTURERS (OEMS) (“BEST IN CLASS”) BY SERVICE CATEGORY
  • 41. 41 Products, solutions and services can be procured for all locations, by region or even by site: 1. For each solution/service type, which model would you recommend (i.e. procure the same solution set/service provider for all locations, for each region or for every site? Why ? 2. Should products and/or services international locations be procured separately? Procurement – Geographical ConsiderationsE Options Region X Region Y Etc… Building 1 Building 2 Building 3 Building 4 Building X All locations OEM A OEM A OEM A OEM A OEM A Supplier by Region OEM A OEM A OEM B OEM B OEM X Supplier by Site OEM A OEM B OEM B OEM C OEM X 1 Discussion Topic
  • 42. 42 Consolidation and Migration Strategies SSC will be using a building-by-building approach for telecommunications services delivered inside buildings (eg. network, voice and videoconferencing services) Are there strategies that you would recommend to: 1. Minimize user disruption and maximize resource efficiency during the roll out phase of these initiatives? 2. Are there migration strategies which you would recommend to migrate and consolidate the various partner domains (workload migration, overlapping network addressing, etc.) particularly within a multi-tenant environment? HOW THE TELECOMMUNICATIONS COMPONENTS FIT TOGETHER 2 Discussion Topic
  • 43. 43 Bundling of Products/Solutions/Services There are many products, solution sets and/or services which could be bundled together. 1. Which products, solutions and/or services would you recommend bundling together? (e.g. should routers and firewalls be bundled together) Why ? 2. Should network and security products be procured together? 3. In the case where product/solutions are procured, should maintenance (beyond the warranty period) be bundled together or procured separately? 3 Discussion Topic
  • 44. 44 Considerations for including additional services • Recently, SSC held an Industry Engagement on Inter and Intra Data Centre Network services, to gather valuable feedback on the approach for delivering the DCN services • Based on the feedback received, SSC is considering the option of including the Inter and Intra DCN services within the scope of the NSSC procurement vehicle, to enable the flexibility of defining a hybrid model • Should NSSC procurement vehicles include products/solutions related to Data Centre Networks or should these be procured separately ? • Should other categories of products such as videoconferencing products be included in NSSC? If so, which ones would you recommend including ? 4 Discussion Topic
  • 46. 46 SSC is seeking a strategy that will enable the GC to cost-effectively deliver transformed Intra-Building network services. The following are areas of consideration: A. Sourcing Strategy: What is the recommended sourcing model for intra- building network services (Out-sourced service, Hybrid or In-sourced)? What are the benefits, technical challenges, requirements and recommended pricing model for successful deployment and ongoing support of each deployment model? B. Open Standards: Which standards should be adopted to ensure interoperability between different OEMs? Which ones should be avoided ? Are there areas where interoperability between OEM products is challenging ? Are there situations where a single OEM model would be recommended? Which type of equipment where OEM variation could be considered by region/site? What are the integration/interoperability implications of each option? Key Questions for Industry Feedback STRATEGY
  • 47. 47 C. Bundling: Which services or group of products should be bundled together when procuring a solution? Should other areas such as videoconferencing end- points and data centre networks be bundled in or kept in separate procurement vehicles? D. Buy vs Lease: Should the products/services be procured or leased? What are the pros and cons of each option: buy vs. lease vs. bundle with services? E. Supplier Strategy: What supply method would be optimal to achieve best value/lowest TCO and interoperability? Should certain products/solutions be bundled into a single contract/supplier/service provider over a long period (ie. years) ? If so, for how long? Should this be separated by region? For services, should single or multiple service providers be considered? What are the pros and cons for each option? F. Transformation Strategy: What are some key considerations/strategies in consolidating networks? What procurement strategies were used in these cases? (i.e. integrators, service providers, buy/lease. Provide examples, use cases, white papers, etc. Key Questions for Industry Feedback (continued)
  • 48. 48 1. What support model would you propose for a site once it has been transformed, considering both the multi-tenant and single tenant site? 2. What are the strategies, technical considerations and challenges for ensuring smooth integration with Integrated Command Centre (DOC/NOC/SOC) and other enabling foundational services (DNS, DHCP, ICAM, etc.)? 3. What are the possible technology or service enhancements over the coming years that we may need to consider in our requirements? How can emerging trends/technologies be incorporated into the proposed solutions? How can we keep technologies up to date given the length of transformation? How could they contribute to the Savings, Security and Service objectives? Additional Questions for Industry Feedback OPERATIONAL/TECHNICAL:
  • 49. 49 4. What value-added services would you recommend that we should be incorporating? For example Videoconferencing services and Data Centre Network services (Inter & Intra) be bundled within the same procurement vehicles as those related to Network Solutions Supply Chain. 5. What are the perceived barriers to success and risks that require mitigation strategies? 6. Please provide strategies/input on how SSC could best achieve the use of current generation products and future generation products throughout the lifetime of the procurement vehicle(s). OPERATIONAL/TECHNICAL: Additional Questions for Industry Feedback (continued)
  • 50. 50 7. How should SSC approach product substitutions in future procurement vehicles? 8. Notwithstanding the requirements that have been identified today, please provide insight and advice on how to best ensure ongoing manufacturer supply chain integrity. 9. Please provide your views how to best integrate network security into the proposed solutions/services, while keeping aligned with technological enhancements that address the evolving threat landscape? OPERATIONAL/TECHNICAL: Additional Questions for Industry Feedback (continued)
  • 51. 51 1. What strategy would you propose to improve procurement and lower costs? 2. SSC recognizes that many different pricing models can be used to achieve value to the Crown. Given the requirements outlined, please suggest various pricing models that could be used for the different sourcing options. 3. Should future procurement vehicles include categorization as currently exists within the Network Equipment Support Services (NESS) procurement vehicle or should a solutions-based approach be pursued? What approach would you propose for future procurement vehicles? PROCUREMENT: Additional Questions for Industry Feedback (continued)
  • 52. 52 4. Provide recommendations for requirements to maximize competitiveness and reduce the TCO. What are the factors that drive rates up? 5. What are the industry standards for wired and wireless services should be included as part of requirements in future procurement vehicles? 6. Should products/services for international locations be procured separately? If so, why? Additional Questions for Industry Feedback (continued) PROCUREMENT:
  • 53. 53 Next Steps • Industry feedback on discussion topics and questions to be received by June 13, 2014 • Evaluate input / feedback received to refine procurement and sourcing strategy • Proceed with the procurement of network solutions supply chain in a timely manner
  • 55. Network Solutions Supply Chain (NSSC) Collaborative Procurement Solutions Approach Tom Mercer Shared Services Canada Manager Procurement and Vendor Relationships Directorate May 28, 2014
  • 56. Collaborative Procurement Solutions Approach Industry Engagement Day Invitation to Qualify (ITQ) Review and Refine Refinements (RRR) Bid Solicitation Phase Contract Award 56
  • 57. • The purpose is to qualify suppliers who have demonstrated and proven skills and experience in implementing and providing network solutions that will support the transformation and maintenance of wired local area networks (LANs) and wireless LANs (Wi-Fi) and other supporting telecommunications equipment and services. • Evaluation criteria will focus on the supplier’s capabilities and experience to deliver NSSC services. • Suppliers who meet the mandatory ITQ evaluation criteria will be deemed successful “Qualified Respondents” (QRs) and will proceed to the RRR phase. • Canada will inform Qualified Respondents that, in the “Review and Refine Requirements Phase”, a draft Statement of Work (SOW) will be provided to them and at that time. Invitation to Qualify (ITQ) Phase 57 Invitation to Qualify (ITQ)
  • 58. • Canada will provide the Qualified Respondents with a draft RFP(s). • Canada will interact with Qualified Respondents to seek feedback and clarification on Canada’s requirements to refine the RFP(s) (e.g. workshops, one-on-one sessions, Q’s and A’s). • A Supply Chain Security Information (SCSI) assessment will also be started during this stage. Review and Refine Requirements (RRR) Phase 58 Review and Refine Requirements (RRR)
  • 59. • Canada may issue one or more formal Request for Proposal(s) (RFP(s)) to the Qualified Respondents who have participated in the ITQ and RRR Phases • Each Qualified Respondent will be permitted to formally bid on the requirements set out in the RFP(s). Bid Solicitation Phase 59 Bid Solicitation Phase
  • 60. • Contract Award will occur after completion of the Bid Solicitation Phase • One or more contracts may be awarded depending on the Request for Proposal(s) Contract Award and Implementation 60 Contract Award
  • 61. 6161 Cyber & Supply Chain Threats to the GC Network Solutions Supply Chain Industry Day May 28, 2014 Brad McInnis Communications Security Establishment
  • 62. 62 UNCLASSIFIED 62 CSE: What We Do • CSE: Canada’s national cryptologic agency • Our Mandate – Foreign Signals Intelligence – IT Security – Support to Lawful Access • ‘B’ Mandate – To provide advice, guidance and services to help ensure the protection of electronic information and of information infrastructures of importance to the Government of Canada
  • 63. 63 UNCLASSIFIED 63 CSE: IT Security Program • We help prevent, detect and defend against IT security threats and vulnerabilities • CSE provides unique technical expertise, capabilities and classified information that we use to complement commercial security technologies available to IT security practitioners • We use our own methods and operations to detect and defend against threats that are not in the public domain
  • 64. 64 UNCLASSIFIED 64 Effects of Market Forces on Technology • Market forces favour commercial and personal technologies over requirements for security features • Our society is almost totally dependent on software and hardware commercial technology providers from global markets • New products and new versions of products are rapidly produced • No regulatory framework exists for hardware/software safety and security • Traditional government policies and processes impose security requirements after products and systems have been developed • Few incentives for commercial technology developers to invest in security
  • 65. 65 UNCLASSIFIED 65 Technology Vulnerabilities • “People write software sloppily. Nobody checks it for mistakes before it gets sold” – Peiter Zatko (Mudge), WhiteHouse Cyber-Security Summit (2000) • Unintentional vulnerabilities or weaknesses – Design flaws – Implementation errors • Cyber Threat – A threat actor, using the Internet, takes advantage of a known vulnerability in a product for the purpose of exploiting a network and the information the network carries • Intentional vulnerabilities or weaknesses – Predetermined deliverables can be implanted in a product with or without knowledge of company. • Supply Chain Threat – a product can be easily tampered with in the supply chain to later facilitate a cyber-intrusion against that product in order to exploit a network and the information the network carries
  • 66. 66 UNCLASSIFIED 66 The Evolving Cyber-Threat • Today, malicious cyber activities are directed against Canada and our closest allies on a daily basis • Threat actors range in sophistication from malfeasant hackers to organized crime groups, to terrorists to nation states • Canadians trust the GC to defend Canada’s cyber sovereignty and protect and advance our national security and economic interests
  • 67. 67 UNCLASSIFIED 67 An Issue of National Security • Risks from vulnerable technologies – Covert and persistent access by cyber threat actors in GC departmental networks threatens the sovereignty of GC information and the continuity of government operations – Cyber threat actors are effective at exploiting inter-connected network element technologies and management systems used to administer and operate network infrastructures (i.e. Mandiant APT1 Report) • Risks from an overly complex and decentralized threat surface – Consolidation of GC networks is a prerequisite for manageable cyber protection & defence – Security through obscurity is not a viable long-term strategy to deter cyber threat actors • Risks from the supply chain – Increases opportunities for threat actors to circumvent GC cyber security measures – More difficult for the GC to detect and remediate
  • 68. 68 UNCLASSIFIED 68 GC Shared Services Procurements • Shared Services Canada and CSE are working in partnership to eliminate or significantly reduce risks to the GC from cyber threats & global supply chain vulnerabilities • CSE will provide follow-up briefings on supply chain risk mitigation to interested suppliers for GC shared services – Companies must be willing to sign a CSE non-disclosure agreement to receive this information • Security requirements for cyber-protection, cyber-defence and supply chain risk mitigation must be met by suppliers in order to successfully bid on GC shared services initiatives – As the IT Security authority for the GC, CSE will seek long-term partnerships with successful suppliers – CSE will assist Shared Services Canada in the pedigree analysis of supply chain information provided by respondents • Examples of these requirements can be found on CSE’s website under Technology Supply Chain Guidance
  • 69. 69 Supply Chain Integrity (SCI) Network Solutions Supply Chain Industry Engagement Day May 28th, 2014 Simon Levesque Sr. Director Planning and Design, Cyber and IT Security Transformation Program
  • 70. 70  The purpose of the Supply Chain Security Information (SCSI) assessment process is to ensure that no un-trusted equipment, software or services, procured by SSC, are used to deliver and/or support GC services.  Respondents must successfully pass the SCSI assessment process in order to remain Qualified Respondents. SCSI assessments are being applied consistently to SSC procurement activities; as a result, we can count some of these recent contracts as having verified Supply Chains: Email Transformation Initiative, Managed Security Services, Data Centre Consolidation, and others. Nature of the SCI
  • 71. 71 SCI in Competitive Procurement 2nd Rejection SCI Authority reviews SCSI in consultation with Security Partners Decision by SCI Authority Debrief session with respondent No Yes Rejected respondent has 10 calendar days to resubmit revised equipment list Receive Approval Letter for pre-qualification Qualified Respondents are accepted at the next phase of procurement SCI determination & pre-requisite National Security Exception 1st Rejection Respondents provide Supply Chain Security Information (SCSI) Respondent does not qualify Competitive procurement starts Competitive procurement ends Cross-check of lists provided for SCI and at implementation
  • 72. 72 Required Information from the Respondents • Once the SOW is finalized, GC will request that the respondents provide their Supply Chain Security Information. More specifically, when it applies, the GC will be requesting the following detailed information: 1. List of equipment used to deliver the service (vendor, manufacturer, model number, software load version). 2. List of subcontractors (names of companies and the location from where these services are delivered). 3. Network diagram. 4. All of the above applies for sub-contractors and partners (sub-contractors and their own sub-contractors). This should include all companies who will be sub-contracted to provide equipment or services as part of the project.
  • 73. 73 On-going Supply Chain Integrity Auditing Rejected supplier has to resubmit revised equipment list On-going SCI auditing from the moment the contract has been awarded until it ends. Internal threat evaluation can lead to the questionning/exclusion of specific equipment/services Supplier provides amended Supply Chain Security Information (SCSI) SCI Authority reviews SCSI in consultation with Security Partners Decision by SCI Authority No Yes Supplier receives Amendment Approval Letter Procurement initiates a debrief session with the supplier and the SCI Authority initiates Recall procedures and communicates with Technical Authorities to mitigate SCI Authority monitors threats and audits results in consultation with Security Partners Threats Identification Yes SCI Authority initiates a debrief session with the supplier, initiates the Recall procedures and communicates with Technical Authorities to mitigate
  • 74. Networks Solutions Supply Chain Industry Day Questions & Answers
  • 75. Networks Solutions Supply Chain Industry Day Recap / Closing Remarks