1 / 23

Tony Montemarano Director, IA/NETOPS Programs 10 May 2006

GIG-BE & IA/NETOPS Programs. Tony Montemarano Director, IA/NETOPS Programs 10 May 2006. Unclassified. Outline. Environment GIG-BE Information Assurance NETOPS. Some Key DISA Implementation Players. “Sustainment”. DISN & GIG-BE: Cindy Moran GE Engineer: Alan Lewis

alexandria
Download Presentation

Tony Montemarano Director, IA/NETOPS Programs 10 May 2006

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. GIG-BE & IA/NETOPS Programs Tony Montemarano Director, IA/NETOPS Programs 10 May 2006 Unclassified

  2. Outline Environment GIG-BE Information Assurance NETOPS

  3. Some Key DISA Implementation Players “Sustainment” DISN & GIG-BE: Cindy Moran GE Engineer: Alan Lewis DECCs: Alfred Rivera Paul Hollowell CTO/GE: Dave Mihelcic IA/NETOPS: Tony Montemarano CIAE: Richard Hale NCES: Becky Harris Ed Simacco NECC: Brig Gen Dave Warner Bernal Allen Satellite/Teleport: Becca Cohen Hirsh GE Engineer: Rich Williams Gene Steffanucci (CS) Forecast to Industry @ Technet 19 - 20 June “PEO Structure” Diann McCoy (CAE) Engineers Does NOT reflect formal organizational relationships

  4. Agency Vision Best Value Operational Excellence Power to the Edge Information Speed

  5. Washingtonian “Laws of Physics” For every action, there is an equal and opposite criticism. The more people influencing an initiative, the longer it will take to finish it. Anyone can say no. Things in motion, tend to stop. We must understand the “Laws of Physics” and Work Together to overcome them!

  6. Accomplishing the Mission Point B Point A Point B Staying inside the red lines!!

  7. A – B - C Adopt before Buy before Create Speed Work Smarter not Harder Unity of Effort among Services and Agencies

  8. DISA Industry RelationshipProviding the GIG-BE Government Staffing Contractor Control Government Contractor Security & Flexibility Of Control & The Experience Of Industry

  9. GIG-BE Government – Industry Team Booz | Allen | Hamilton GBS FIBER FIBER FIBER FIBER FIBER FIBER FIBER

  10. DoD Vision …in communicator’s terms Net Centricity Anyone, anything, anywhere can get to any data source and can exploit the information they are authorized to access! Using Internet-like attributes (e.g. SOAs) to facilitate Fighting the Future Fight

  11. Transformational Initiatives Information Assurance Transformational Communications System Joint Tactical Radio System GIG Bandwidth Expansion GIG Enterprise Services

  12. GIG-BEGlobal Information Grid-Bandwidth Expansion Ubiquitous, Secure, Robust, Optical IP Terrestrial Network 85 Sites Physical Diversity Increased Bandwidth Scalability

  13. Service Delivery Node (SDN) Initial Implementation & Capability (CONUS/Europe) Lambda 10 Gbps Averaging 105 Gbps per link Router Unclas IP N x 1 GBPS Juniper Scalable to Hundreds of Times Current Capacities Ciena Optical Digital Cross Connect Secret IP 2 Gbps Sycamore XX* XX* Optical Add-Drop Multiplexor Or Terminal TS/SCI IP 2 Gbps XX* XX* Carrier Class Equipment Pt to Pt 2.5 Gbps Cisco Multi Service Provisioning Platform State-of-the-Art Redundant Out-of-Band Network Management

  14. The Life Cycle of Change GIG-BE Power Point Phase Reality Phase Peak of Inflated Expectations Slope of Enlightenment Plateau of Productivity Technology Trigger Trough of Disillusionment Time

  15. Challenges

  16. Information Assurance Primary Goal: Assured mission execution in the face of cyber attack Most attacks stopped by protections When cyber attacks cannot be stopped, DoD can detect, diagnose, and react to attacks quickly, and bring missions back on line

  17. In Band & Physical Threats A C C E S S A C C E S S A C C E S S A C C E S S A C C E S S A C C E S S Insider W I R E T A P W I R E T A P ACCESS A C C E S S RF TAP ACCESS RF TAP IA Challenge We must guard against the “Health Spa Mentality” On Travel DoD Partner Home Information Network App Mgmt DNS Wireless Diagnose React Detect Protect Internet DOD WAN Enclave Wireless Net Mgmt Net Mgmt “Back Door Connection”

  18. GIG vs. Internet STRATCOM JTF-GNO Accountability & Security INTERNET Actively Monitored And Controlled Filters GIG Defined, Controlled and Protected

  19. NETOPS Operating the Weapon System

  20. “End to End” in DoD The “Free” Part Wide Area “Last Half Mile” “The Other Last Half Mile” NETOPS …or Tactical Environment Base Base

  21. Situational AwarenessObjective Wide Area Strategic /Tactical Enclave We must recognize that the NFL has set the expectation! Any Mgmt Center can see across the enterprise as necessary! UDOP: User Defined Operational Picture

  22. Summary Information Assurance Funded – Numerous important efforts needing correlation and synchronization NETOPS Disparately funded – Taking shape…with a lot to do We can’t do it without industry!!

  23. www.disa.mil

More Related