SlideShare a Scribd company logo
1 of 12
Download to read offline
CAPT Christopher Page, USN
Deputy Director, Assured Command & Control Division
OPNAV N2/N6F1
Unclassified
20140507
2UNCLASSIFIED
Information Dominance
3
“Operational advantage gained from fully
integrating information functions, capabilities
and resources to optimize decision making
and maximize warfighting effects.”
Accomplished by 3 core capabilities:
 Assuring C2
 Maintaining Battlespace Awareness
 Integrating Fires
Delivering Warfighting Effects!
UNCLASSIFIED
4
Satellites and Tactical Datalinks
Correlate, decide, disseminate in all environments
Electromagnetic
Spectrum
C3 PlatformsTools
Afloat and Ashore Networks
Unclassified
 Warfighter’s Assured C2 Perspective
– Data Availability
– Data Integrity
– Data Confidentiality
 Adversary’s Perspective
– The above present exploitable attack vectors
 Must identify attack vectors, map materiel solutions and develop
appropriate policy and Tactics, Techniques, and Procedures (TTP)
 Must be addressed in a comprehensive, end-to-end architecture
– Individually addressing Availability, Integrity and/or Confidentiality
will not “Assure C2”
5
Agile policy underpins a comprehensive end to end architecture
 Assured communications architecture despite the full range of
adversary actions, environment impacts, and EM Spectrum dynamics
 There is no Silver Bullet
– Asymmetric Space and Cyber threats require an architectural response
– Includes: Transport, Networks, Policy, Applications
 New Concept of Operations (CONOPS) and TTP
– Fleet will fight with significantly less network access
 Joint, Interagency, and Coalition interoperability are paramount
 Austere budget environment demands better decision-making, greater
agility, stronger partnerships with service providers
6
Our greatest capabilities can become our greatest vulnerabilities
 Bolster Nuclear Command, Control, and Communications (NC3)
capabilities for Navy and the Nation
 Implement Joint Information Environment (JIE) and Intelligence
Community Information Technology Enterprise (IC ITE)
 Execute named Cyber Remediation campaign across Navy’s end-to-
end Information Dominance Enterprise Architecture (IDEA)
 Finalize Technology Transition Agreement (TTA) for integrating
Naval Tactical Cloud (NTC) into Agile Core Services (ACS)
 Mature Assured C2 Integrated Readiness Assessment (IRA) and IT
Baseline Assessment Memorandum (BAM)
 Manage Assured C2 Programs of Record across the ashore, afloat,
and aloft segments of the IDEA
7
CANES – CONSOLIDATED AFLOAT NETWORKS AND ENTERPRISE SERVICE
 Consolidate multiple afloat networks:
– Provide secure, reliable common hosting for multiple C4I applications
– Provide integrated voice, video, data and system management
– Single, scalable IT platform that will enable Assured C2
8
Today:
Tactical Data Link (TDL)
EM Spectrum Awareness
Tomorrow:
9
Navy Marine
Corps Intranet Continuity of Service Contract
Next Generation
Enterprise Network
OCONUS Navy Enterprise Network
JIE = Joint Information Environment
Navy
Information
Environment
Sensitive Compartmented Information Networks
IC ITE = Intel Community IT Enterprise
CANES
10
NGEN, CANES, DCC are keys to success -- aligned to JIE
Next Generation Enterprise
Network (NGEN)
Data Center Consolidation (DCC)
Consolidated Afloat
Networks and Enterprise
Services (CANES)
 Ensure commander’s ability to command assigned forces in any
environment
 Assured EM spectrum access in high-threat scenarios to
transport, share, store, protect and disseminate critical data
 “Operationalization” of the EM spectrum and cyberspace into a
warfighting domain
Enable use of the EM spectrum as maneuver space.
11
Assured
C2
Battlespace
Awareness
Integrated
Fires
Assured EM Spectrum - Pathway to Navy Information Dominance
 Assured C2 sets conditions for Navy commanders to maintain the IT-
enabled ability to exercise C2 authorities across the sea, land, air, space,
and cyberspace domains in heavily contested or denied operating
conditions.
 Navy must continue to clearly define and manage capability-based Assured
C2 requirements and resources, and align those requirements and
resources with JIE/IC ITE through the IDEA
 The primary beneficiaries of the effort to deliver Assured C2 capabilities are
the requirements stakeholders: USFF, USPACFLT, and USFLTCYBERCOM
subordinate commanders who execute Navy’s warfighting mission in all
domains.
12
Assuring C2 for Information Dominance

More Related Content

Viewers also liked

The Five Essential Truths of the Application Economy
The Five Essential Truths of the Application EconomyThe Five Essential Truths of the Application Economy
The Five Essential Truths of the Application EconomyCA Technologies
 
IT Certifications that Pay Well - And Why to Consider CloudMASTER
IT Certifications that Pay Well - And Why to Consider CloudMASTERIT Certifications that Pay Well - And Why to Consider CloudMASTER
IT Certifications that Pay Well - And Why to Consider CloudMASTERCarver Technology Consulting LLC
 
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...Dana Gardner
 
CloudOpen 2014 - Mixing Your Open Source Cloud Cocktail
CloudOpen 2014 - Mixing Your Open Source Cloud CocktailCloudOpen 2014 - Mixing Your Open Source Cloud Cocktail
CloudOpen 2014 - Mixing Your Open Source Cloud CocktailMark Hinkle
 
Infographic - The True Cost of Downtime
Infographic - The True Cost of DowntimeInfographic - The True Cost of Downtime
Infographic - The True Cost of DowntimeAppDynamics
 
Deep Organisational Transformation a model for a higher Agility
Deep Organisational Transformation a model for a higher AgilityDeep Organisational Transformation a model for a higher Agility
Deep Organisational Transformation a model for a higher AgilityAndreas Prins
 
Converged IoT Systems: Bringing the Data Center to the Edge of Everything
Converged IoT Systems: Bringing the Data Center to the Edge of EverythingConverged IoT Systems: Bringing the Data Center to the Edge of Everything
Converged IoT Systems: Bringing the Data Center to the Edge of EverythingDana Gardner
 
Summit 2014 Keynote
Summit 2014 KeynoteSummit 2014 Keynote
Summit 2014 KeynoteAtlassian
 
DevOps and Continuous Delivery reference architectures for Docker
DevOps and Continuous Delivery reference architectures for DockerDevOps and Continuous Delivery reference architectures for Docker
DevOps and Continuous Delivery reference architectures for DockerSonatype
 
Grafana is not enough: DIY user interfaces for Prometheus
Grafana is not enough: DIY user interfaces for PrometheusGrafana is not enough: DIY user interfaces for Prometheus
Grafana is not enough: DIY user interfaces for PrometheusWeaveworks
 

Viewers also liked (13)

The Five Essential Truths of the Application Economy
The Five Essential Truths of the Application EconomyThe Five Essential Truths of the Application Economy
The Five Essential Truths of the Application Economy
 
IT Certifications that Pay Well - And Why to Consider CloudMASTER
IT Certifications that Pay Well - And Why to Consider CloudMASTERIT Certifications that Pay Well - And Why to Consider CloudMASTER
IT Certifications that Pay Well - And Why to Consider CloudMASTER
 
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
 
CloudOpen 2014 - Mixing Your Open Source Cloud Cocktail
CloudOpen 2014 - Mixing Your Open Source Cloud CocktailCloudOpen 2014 - Mixing Your Open Source Cloud Cocktail
CloudOpen 2014 - Mixing Your Open Source Cloud Cocktail
 
Infographic - The True Cost of Downtime
Infographic - The True Cost of DowntimeInfographic - The True Cost of Downtime
Infographic - The True Cost of Downtime
 
Lean Security
Lean SecurityLean Security
Lean Security
 
Deep Organisational Transformation a model for a higher Agility
Deep Organisational Transformation a model for a higher AgilityDeep Organisational Transformation a model for a higher Agility
Deep Organisational Transformation a model for a higher Agility
 
Converged IoT Systems: Bringing the Data Center to the Edge of Everything
Converged IoT Systems: Bringing the Data Center to the Edge of EverythingConverged IoT Systems: Bringing the Data Center to the Edge of Everything
Converged IoT Systems: Bringing the Data Center to the Edge of Everything
 
Summit 2014 Keynote
Summit 2014 KeynoteSummit 2014 Keynote
Summit 2014 Keynote
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
DevOps and Continuous Delivery reference architectures for Docker
DevOps and Continuous Delivery reference architectures for DockerDevOps and Continuous Delivery reference architectures for Docker
DevOps and Continuous Delivery reference architectures for Docker
 
Grafana is not enough: DIY user interfaces for Prometheus
Grafana is not enough: DIY user interfaces for PrometheusGrafana is not enough: DIY user interfaces for Prometheus
Grafana is not enough: DIY user interfaces for Prometheus
 
NAVFAC Conference Briefing
NAVFAC Conference BriefingNAVFAC Conference Briefing
NAVFAC Conference Briefing
 

Similar to @AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page

White Paper: Enhanced Mission Effectiveness through Improved Connectivity
White Paper: Enhanced Mission Effectiveness through Improved ConnectivityWhite Paper: Enhanced Mission Effectiveness through Improved Connectivity
White Paper: Enhanced Mission Effectiveness through Improved ConnectivityHelene Savvidis
 
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Adil Khan
 
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...AFCEA International
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...AFCEA International
 
Dunkle resume Info tech spec2
Dunkle resume Info tech spec2Dunkle resume Info tech spec2
Dunkle resume Info tech spec2david dunkle
 
NDIA_NEN_27 Sep 2022_FINAL.pdf
NDIA_NEN_27 Sep 2022_FINAL.pdfNDIA_NEN_27 Sep 2022_FINAL.pdf
NDIA_NEN_27 Sep 2022_FINAL.pdfPEODigital
 
Software technologies in defence ppt
Software technologies in defence pptSoftware technologies in defence ppt
Software technologies in defence pptSantosh Kumar
 
softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdf
softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdfsoftwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdf
softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdfCHANDANBISHT33
 
Thornton_Test-Tech
Thornton_Test-TechThornton_Test-Tech
Thornton_Test-TechBen Thornton
 
NATO Federated Mission Networking
NATO Federated Mission NetworkingNATO Federated Mission Networking
NATO Federated Mission NetworkingJohn Palfreyman
 
Donald Corliss - SM TM
Donald Corliss - SM TMDonald Corliss - SM TM
Donald Corliss - SM TMDonnie Corliss
 
Jaime D Lujan_24Sept15
Jaime D Lujan_24Sept15Jaime D Lujan_24Sept15
Jaime D Lujan_24Sept15Jaime Lujan
 
Resume - Ragadio_Jeveck
Resume - Ragadio_JeveckResume - Ragadio_Jeveck
Resume - Ragadio_JeveckJeveck Ragadio
 
Commscope Federal Solutions Paper.PDF
Commscope Federal Solutions Paper.PDFCommscope Federal Solutions Paper.PDF
Commscope Federal Solutions Paper.PDFKevin LeVan
 
CW3 WRIGHT RESUME.docx1.docx2
CW3 WRIGHT RESUME.docx1.docx2CW3 WRIGHT RESUME.docx1.docx2
CW3 WRIGHT RESUME.docx1.docx2chris wright
 
Signal Commandant Presentation: TechNet Augusta 2015
Signal Commandant Presentation: TechNet Augusta 2015Signal Commandant Presentation: TechNet Augusta 2015
Signal Commandant Presentation: TechNet Augusta 2015AFCEA International
 
Michael Egan Resume
Michael Egan ResumeMichael Egan Resume
Michael Egan ResumeMichael Egan
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresMohammed Saqib
 
Resume Weber Elijah
Resume Weber ElijahResume Weber Elijah
Resume Weber ElijahElijah Weber
 

Similar to @AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page (20)

White Paper: Enhanced Mission Effectiveness through Improved Connectivity
White Paper: Enhanced Mission Effectiveness through Improved ConnectivityWhite Paper: Enhanced Mission Effectiveness through Improved Connectivity
White Paper: Enhanced Mission Effectiveness through Improved Connectivity
 
Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)Network Centric to Data Centric Networks (Data Distribution Service)
Network Centric to Data Centric Networks (Data Distribution Service)
 
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
 
Dunkle resume Info tech spec2
Dunkle resume Info tech spec2Dunkle resume Info tech spec2
Dunkle resume Info tech spec2
 
NDIA_NEN_27 Sep 2022_FINAL.pdf
NDIA_NEN_27 Sep 2022_FINAL.pdfNDIA_NEN_27 Sep 2022_FINAL.pdf
NDIA_NEN_27 Sep 2022_FINAL.pdf
 
Software technologies in defence ppt
Software technologies in defence pptSoftware technologies in defence ppt
Software technologies in defence ppt
 
softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdf
softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdfsoftwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdf
softwaretechnologiesindefence-ppt-130522194934-phpapp01 (1).pdf
 
Thornton_Test-Tech
Thornton_Test-TechThornton_Test-Tech
Thornton_Test-Tech
 
NATO Federated Mission Networking
NATO Federated Mission NetworkingNATO Federated Mission Networking
NATO Federated Mission Networking
 
Donald Corliss - SM TM
Donald Corliss - SM TMDonald Corliss - SM TM
Donald Corliss - SM TM
 
Jaime D Lujan_24Sept15
Jaime D Lujan_24Sept15Jaime D Lujan_24Sept15
Jaime D Lujan_24Sept15
 
Resume - Ragadio_Jeveck
Resume - Ragadio_JeveckResume - Ragadio_Jeveck
Resume - Ragadio_Jeveck
 
Commscope Federal Solutions Paper.PDF
Commscope Federal Solutions Paper.PDFCommscope Federal Solutions Paper.PDF
Commscope Federal Solutions Paper.PDF
 
CW3 WRIGHT RESUME.docx1.docx2
CW3 WRIGHT RESUME.docx1.docx2CW3 WRIGHT RESUME.docx1.docx2
CW3 WRIGHT RESUME.docx1.docx2
 
Military Defense Solutions Overview
Military Defense Solutions OverviewMilitary Defense Solutions Overview
Military Defense Solutions Overview
 
Signal Commandant Presentation: TechNet Augusta 2015
Signal Commandant Presentation: TechNet Augusta 2015Signal Commandant Presentation: TechNet Augusta 2015
Signal Commandant Presentation: TechNet Augusta 2015
 
Michael Egan Resume
Michael Egan ResumeMichael Egan Resume
Michael Egan Resume
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
Resume Weber Elijah
Resume Weber ElijahResume Weber Elijah
Resume Weber Elijah
 

More from GovCloud Network

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmarkGovCloud Network
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for meGovCloud Network
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeGovCloud Network
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in CyberspaceGovCloud Network
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessGovCloud Network
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)GovCloud Network
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefGovCloud Network
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013GovCloud Network
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013GovCloud Network
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 
Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013GovCloud Network
 
Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...GovCloud Network
 
Texas Dept of Information Resources Agency Strategic Plan
Texas Dept of Information Resources Agency Strategic PlanTexas Dept of Information Resources Agency Strategic Plan
Texas Dept of Information Resources Agency Strategic PlanGovCloud Network
 
Gravitant Whitepaper Cloud for Federal Govt
Gravitant Whitepaper Cloud for Federal GovtGravitant Whitepaper Cloud for Federal Govt
Gravitant Whitepaper Cloud for Federal GovtGovCloud Network
 

More from GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 
Cloud computing-made-easy
Cloud computing-made-easyCloud computing-made-easy
Cloud computing-made-easy
 
Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013Implementing big data in the cloud v2.5 3 4 2013
Implementing big data in the cloud v2.5 3 4 2013
 
Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...
 
Texas Dept of Information Resources Agency Strategic Plan
Texas Dept of Information Resources Agency Strategic PlanTexas Dept of Information Resources Agency Strategic Plan
Texas Dept of Information Resources Agency Strategic Plan
 
Gravitant Whitepaper Cloud for Federal Govt
Gravitant Whitepaper Cloud for Federal GovtGravitant Whitepaper Cloud for Federal Govt
Gravitant Whitepaper Cloud for Federal Govt
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page

  • 1. CAPT Christopher Page, USN Deputy Director, Assured Command & Control Division OPNAV N2/N6F1 Unclassified 20140507
  • 3. Information Dominance 3 “Operational advantage gained from fully integrating information functions, capabilities and resources to optimize decision making and maximize warfighting effects.” Accomplished by 3 core capabilities:  Assuring C2  Maintaining Battlespace Awareness  Integrating Fires Delivering Warfighting Effects! UNCLASSIFIED
  • 4. 4 Satellites and Tactical Datalinks Correlate, decide, disseminate in all environments Electromagnetic Spectrum C3 PlatformsTools Afloat and Ashore Networks Unclassified
  • 5.  Warfighter’s Assured C2 Perspective – Data Availability – Data Integrity – Data Confidentiality  Adversary’s Perspective – The above present exploitable attack vectors  Must identify attack vectors, map materiel solutions and develop appropriate policy and Tactics, Techniques, and Procedures (TTP)  Must be addressed in a comprehensive, end-to-end architecture – Individually addressing Availability, Integrity and/or Confidentiality will not “Assure C2” 5 Agile policy underpins a comprehensive end to end architecture
  • 6.  Assured communications architecture despite the full range of adversary actions, environment impacts, and EM Spectrum dynamics  There is no Silver Bullet – Asymmetric Space and Cyber threats require an architectural response – Includes: Transport, Networks, Policy, Applications  New Concept of Operations (CONOPS) and TTP – Fleet will fight with significantly less network access  Joint, Interagency, and Coalition interoperability are paramount  Austere budget environment demands better decision-making, greater agility, stronger partnerships with service providers 6 Our greatest capabilities can become our greatest vulnerabilities
  • 7.  Bolster Nuclear Command, Control, and Communications (NC3) capabilities for Navy and the Nation  Implement Joint Information Environment (JIE) and Intelligence Community Information Technology Enterprise (IC ITE)  Execute named Cyber Remediation campaign across Navy’s end-to- end Information Dominance Enterprise Architecture (IDEA)  Finalize Technology Transition Agreement (TTA) for integrating Naval Tactical Cloud (NTC) into Agile Core Services (ACS)  Mature Assured C2 Integrated Readiness Assessment (IRA) and IT Baseline Assessment Memorandum (BAM)  Manage Assured C2 Programs of Record across the ashore, afloat, and aloft segments of the IDEA 7
  • 8. CANES – CONSOLIDATED AFLOAT NETWORKS AND ENTERPRISE SERVICE  Consolidate multiple afloat networks: – Provide secure, reliable common hosting for multiple C4I applications – Provide integrated voice, video, data and system management – Single, scalable IT platform that will enable Assured C2 8 Today: Tactical Data Link (TDL) EM Spectrum Awareness Tomorrow:
  • 9. 9 Navy Marine Corps Intranet Continuity of Service Contract Next Generation Enterprise Network OCONUS Navy Enterprise Network JIE = Joint Information Environment Navy Information Environment Sensitive Compartmented Information Networks IC ITE = Intel Community IT Enterprise
  • 10. CANES 10 NGEN, CANES, DCC are keys to success -- aligned to JIE Next Generation Enterprise Network (NGEN) Data Center Consolidation (DCC) Consolidated Afloat Networks and Enterprise Services (CANES)
  • 11.  Ensure commander’s ability to command assigned forces in any environment  Assured EM spectrum access in high-threat scenarios to transport, share, store, protect and disseminate critical data  “Operationalization” of the EM spectrum and cyberspace into a warfighting domain Enable use of the EM spectrum as maneuver space. 11 Assured C2 Battlespace Awareness Integrated Fires Assured EM Spectrum - Pathway to Navy Information Dominance
  • 12.  Assured C2 sets conditions for Navy commanders to maintain the IT- enabled ability to exercise C2 authorities across the sea, land, air, space, and cyberspace domains in heavily contested or denied operating conditions.  Navy must continue to clearly define and manage capability-based Assured C2 requirements and resources, and align those requirements and resources with JIE/IC ITE through the IDEA  The primary beneficiaries of the effort to deliver Assured C2 capabilities are the requirements stakeholders: USFF, USPACFLT, and USFLTCYBERCOM subordinate commanders who execute Navy’s warfighting mission in all domains. 12 Assuring C2 for Information Dominance