SlideShare a Scribd company logo
Presenter’s Name June 17, 2003
Mobile Security Project
Mobile Security Solutions Reference Architecture Part B
Federal Network Resilience
1
Presenter’s Name June 17, 20032
Background
 Presidential directive for a comprehensive Digital Government
Strategy (DGS)
 Mobile Security Reference Architecture (MSRA) - Part A
 Mobile security baseline controls
 Mobile Computing Decision Framework (MCDF)
 Released to agencies in May 2013
2
Presenter’s Name June 17, 20033
Part B Objectives
 Develop a Mobile Security Solutions Reference
Architecture – Part B for Federal Civilian Executive
Branch Departments and Agencies.
 Derive from use case based solutions that will
allow agencies to incorporate security and privacy
into their networks
 Take into account differing agency mission types.
3
Presenter’s Name June 17, 2003
4
Department/Agency Only Workshop
4
 Department/Agency Problem Challenge Workshop – July 16
 Location: Software Engineering Institute, 4401 Wilson Blvd.,
Arlington, VA
 Engage D/As and discuss current implementation maturity levels,
solutions and struggles with their mobile implementations.
 Develop use case based scenarios to be presented at the Vendor
Problem Challenge Workshop.
Presenter’s Name June 17, 2003
5
Vendor Only Workshop
5
 Vendor Problem Challenge Workshop – July 25
 Location: NRECA Conference Facility, 4301 Wilson Blvd.,
Arlington, VA
 Registration is required
 Limited to 80 participants
 Present and discuss with vendors the use case based
scenarios developed from the D/A Problem Challenge
Workshop.
 Encourage vendors to provide solid and viable solutions for
D/As regarding mobile security issues.
Presenter’s Name June 17, 2003
6
Contact Information
6
Marilyn Rose
Marilyn.rose@hq.dhs.gov
Yonas Ogbaselassie
Yonas.ogbaselassie@hq.dhs.gov
Presenter’s Name June 17, 2003
7
Registration Information
7
Location: NRECA Conference Facility, 4301 Wilson Blvd.,
Arlington, VA
Registration site:
http://www.sei.cmu.edu/events/msra-workshop-form.cfm
8

More Related Content

Viewers also liked

Mobile security-reference-architecture
Mobile security-reference-architectureMobile security-reference-architecture
Mobile security-reference-architecture
Vishal Sharma
 
SunilBabu_SecurityArchitecture_V2.0
SunilBabu_SecurityArchitecture_V2.0SunilBabu_SecurityArchitecture_V2.0
SunilBabu_SecurityArchitecture_V2.0
Sunil Babu
 
What reference architecture models to adopt
What reference architecture models to adoptWhat reference architecture models to adopt
What reference architecture models to adopt
Chris Haddad
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Symosis Security (Previously C-Level Security)
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
Sukumar Nayak
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
Maganathin Veeraragaloo
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
John Arnold
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
Sarah Moore
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
The Open Group SA
 
A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT
WSO2
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Craig Martin
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
Vladimir Jirasek
 
Security architecture
Security architectureSecurity architecture
Security architecture
Duncan Unwin
 
Cybersecurity-Serverless-Graph DB
Cybersecurity-Serverless-Graph DBCybersecurity-Serverless-Graph DB
Cybersecurity-Serverless-Graph DB
Sukumar Nayak
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
Kris Kimmerle
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
John Bauer
 

Viewers also liked (17)

Mobile security-reference-architecture
Mobile security-reference-architectureMobile security-reference-architecture
Mobile security-reference-architecture
 
SunilBabu_SecurityArchitecture_V2.0
SunilBabu_SecurityArchitecture_V2.0SunilBabu_SecurityArchitecture_V2.0
SunilBabu_SecurityArchitecture_V2.0
 
What reference architecture models to adopt
What reference architecture models to adoptWhat reference architecture models to adopt
What reference architecture models to adopt
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
A Reference Architecture for IoT
A Reference Architecture for IoT A Reference Architecture for IoT
A Reference Architecture for IoT
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Cybersecurity-Serverless-Graph DB
Cybersecurity-Serverless-Graph DBCybersecurity-Serverless-Graph DB
Cybersecurity-Serverless-Graph DB
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 

Similar to Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile Computing Summit | July 9, 2013

Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Tim Harvey
 
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Tim Harvey
 
I018145157
I018145157I018145157
I018145157
IOSR Journals
 
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSSPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
ijwmn
 
Software Bill of Materials
Software Bill of MaterialsSoftware Bill of Materials
Software Bill of Materials
Petar Radanliev
 
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
jakreile
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2
Fred Kautz
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
butest
 
cyber security DOS attack using NS2 ppt content
cyber security DOS attack using NS2 ppt contentcyber security DOS attack using NS2 ppt content
cyber security DOS attack using NS2 ppt content
KrayKarthik
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
IRJET Journal
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
IJNSA Journal
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
IJRAT
 
ISACA TT Training Week Course Outline 2013 (final)
ISACA TT Training Week Course Outline 2013 (final)ISACA TT Training Week Course Outline 2013 (final)
ISACA TT Training Week Course Outline 2013 (final)
tntsa1972
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
Shekhar Vimalendu
 
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
David Sweigert
 
nps49-101310-50 (1)
nps49-101310-50 (1)nps49-101310-50 (1)
nps49-101310-50 (1)
foosaner
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
AM Publications,India
 
Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio Selection
IRJET Journal
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
butest
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Dr.Irshad Ahmed Sumra
 

Similar to Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile Computing Summit | July 9, 2013 (20)

Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
 
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
 
I018145157
I018145157I018145157
I018145157
 
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSSPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
 
Software Bill of Materials
Software Bill of MaterialsSoftware Bill of Materials
Software Bill of Materials
 
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
cyber security DOS attack using NS2 ppt content
cyber security DOS attack using NS2 ppt contentcyber security DOS attack using NS2 ppt content
cyber security DOS attack using NS2 ppt content
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
 
ISACA TT Training Week Course Outline 2013 (final)
ISACA TT Training Week Course Outline 2013 (final)ISACA TT Training Week Course Outline 2013 (final)
ISACA TT Training Week Course Outline 2013 (final)
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
 
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
 
nps49-101310-50 (1)
nps49-101310-50 (1)nps49-101310-50 (1)
nps49-101310-50 (1)
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
 
Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio Selection
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 

More from Tim Harvey

Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...
Tim Harvey
 
Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...
Tim Harvey
 
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Tim Harvey
 
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitProgam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
Tim Harvey
 
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Tim Harvey
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Tim Harvey
 
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
Tim Harvey
 
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Tim Harvey
 
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Tim Harvey
 
May 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationMay 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit Presentation
Tim Harvey
 
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureMay 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
Tim Harvey
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
Tim Harvey
 

More from Tim Harvey (12)

Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...
 
Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...
 
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
 
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitProgam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
 
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
 
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
 
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
 
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
 
May 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationMay 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit Presentation
 
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureMay 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
 

Recently uploaded

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 

Recently uploaded (20)

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 

Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile Computing Summit | July 9, 2013

  • 1. Presenter’s Name June 17, 2003 Mobile Security Project Mobile Security Solutions Reference Architecture Part B Federal Network Resilience 1
  • 2. Presenter’s Name June 17, 20032 Background  Presidential directive for a comprehensive Digital Government Strategy (DGS)  Mobile Security Reference Architecture (MSRA) - Part A  Mobile security baseline controls  Mobile Computing Decision Framework (MCDF)  Released to agencies in May 2013 2
  • 3. Presenter’s Name June 17, 20033 Part B Objectives  Develop a Mobile Security Solutions Reference Architecture – Part B for Federal Civilian Executive Branch Departments and Agencies.  Derive from use case based solutions that will allow agencies to incorporate security and privacy into their networks  Take into account differing agency mission types. 3
  • 4. Presenter’s Name June 17, 2003 4 Department/Agency Only Workshop 4  Department/Agency Problem Challenge Workshop – July 16  Location: Software Engineering Institute, 4401 Wilson Blvd., Arlington, VA  Engage D/As and discuss current implementation maturity levels, solutions and struggles with their mobile implementations.  Develop use case based scenarios to be presented at the Vendor Problem Challenge Workshop.
  • 5. Presenter’s Name June 17, 2003 5 Vendor Only Workshop 5  Vendor Problem Challenge Workshop – July 25  Location: NRECA Conference Facility, 4301 Wilson Blvd., Arlington, VA  Registration is required  Limited to 80 participants  Present and discuss with vendors the use case based scenarios developed from the D/A Problem Challenge Workshop.  Encourage vendors to provide solid and viable solutions for D/As regarding mobile security issues.
  • 6. Presenter’s Name June 17, 2003 6 Contact Information 6 Marilyn Rose Marilyn.rose@hq.dhs.gov Yonas Ogbaselassie Yonas.ogbaselassie@hq.dhs.gov
  • 7. Presenter’s Name June 17, 2003 7 Registration Information 7 Location: NRECA Conference Facility, 4301 Wilson Blvd., Arlington, VA Registration site: http://www.sei.cmu.edu/events/msra-workshop-form.cfm
  • 8. 8