SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
ICH and IT-AAC
Agents of Change
“A public/private partnership operating as an honest broker for IT Innovations, Standards of Practice,
Agile Methods, and just-in-time expertise outside the reach of the Defense Industrial Base”
Honorable Dale Meyerrose, former DNI CIO
VADM Kevin Green, former Deputy CNO, IT-AAC Exec Director
LTGen Ted Bowlds, former AF ESC CMDR, IT-AAC Vice Chair
Dr. Marv Langston, former Navy & DOD CIO, IT-AAC Fellow
John Weiler, CIO & Managing Director, IT-AAC
www.IT-AAC.org
www.ICHnet.org
703 768 0400
Roadmap for Agile IT Management & Modernization:
Measuring Risk & Business Value of IT Investments at the speed of need
Assuring IT Enabled Outcomes
exposing innovations & standards of Global IT market
 IT-AAC 501c3
Consortia of Standards Bodies,
Academia, Think Tanks and Non-
Defense COIs.
Greybeard Council
Focus on sharing Commercial IT
best practices and lessons learned
Conduit to reaching over 20k
innovative companies
Reach core of $3.77 Trillion Global
IT Market
Critical source for Open
Architectures and Standards;
SDN, SOA, Cloud, IA, Mobile,
ITIL/COBIT, Internet of Things
Interop. ClearingHouse 501c6
DOD Chartered Non-profit research
institute
 Focus on measures and metrics for
interoperability, security, service
levels, commerciality & risk.
Resource for mentoring government
transformation efforts
Proven maturity model for Agile
Acquisition, Tech Assessment and
Business Case Analysis
Superior source for risk based
decision making
Conflict free, no rice bowls
IT-AAC’s Collaborative Approach
to Reforming and Assuring IT/Cyber
 Repurposed over 40 existing body of evidence; DSB, DBB,
BENS, GAO, HASC, CRS, NDIA, ACT/IAC, NAS, AF-SAB ….
 Recruited the best, most experienced thought leaders
 Partnered with over 20 leading industry COIs, avoid vested
interests/status quo (SDOs, NGOs, EDUs)
 Conducted 50+ Leadership Workshops, reaching 3,000+
 Supported a dozen successful Agile Acquisition Pilots,…
proving that there is a better way to acquire time sensitive
IT/Cyber Capabilities
IT-AAC Acquisition Swat Team
Tapping the Best and Brightest SMEs
Honorable Jack Gansler PhD, former DUSD, ATL, IT-AAC Chairman
Honorable David Walker, former GAO Comptroller General
VADM Kevin Green, former Deputy CNO
Honorable Dov Zakheim, former USD, Comptroller
Honorable Duane Andrews, former ASD C3I
Honorable John Grimes, former ASD NII
Honorable Dale Meyerrose, MGEN, former DNI CIO
General Paul Kern, USA Ret, former Army AMC Commander, Cohen Group
LtGen Dave Deptula USAF Ret, Former USAF Deputy Chief of Staff, ISR
VADM Dave Oliver, former EADS COO
LtGen Bill Campbell, former Army CIO
LtGen Ted Bowlds USAF Ret, former AF ESC Commander
Dr. Marv Langston, former DOD Deputy CIO & Navy CIO
Kevin Carroll, former Army PEO EIS Director
John Carrow, former DNI Deputy CIO & Unisys Corp. CIO
John Weiler, Managing Director & CIO, IT-AAC
Plus 1,100 delegates emanating from our public/private partnership
IT-AAC Communities of Practice
reaching over 108k innovators
Defense IT Acquisition Ecosystem is Broken
and can’t be fixed with the same thinking that got us there!
Acquisition Lifecycle
• Long acquisition cycle-times
• Successive layers … built over years
• Limited flexibility and agility
• Risk Management is Deficient
Requirements
• Understanding and prioritizing requirements
• Ineffective role and comm in acquisitions
Test/Evaluation
• Testing is integrated too late and serially
• Lack of automated testing
Funding & Governance
• Program-centric, not capability-centric
• Overlapping decision layers
(e.g., multiple review processes)
• Lack of customer-driven metrics
• Funding inflexibility & negative incentives
“The inability to effectively acquire information technology systems is critical
to national security. Thus, the many challenges surrounding information
technology must be addressed if DOD is to remain a military leader in the
future. The development of a new acquisition process, coupled with clear roles
and responsibilities of key decision makers, and an experienced leadership and
workforce, are important elements of the solution.” Defense Science Board
Report to Congress
Body of Evidence (cont)
Continuing the same process is both expensive and insane
 ALF and SELC Documentation and Case Studies
 Updated OMB A-130 Guidance; https://www.whitehouse.gov/sites/default/files/omb/assets/omb/circulars/a130/a130trans4.pdf
 Federal IT Acquisition Reform Act. http://oversight.house.gov/wp-content/uploads/2012/09/9-20-12-Draft-Issa-Oversight-Committee-IT-
Procurement-Reform-Bill1.pdf
 GAO’s 2015 update on DHS IT Acquisition Challenges: http://www.gao.gov/products/GAO-15-171SP
 GAO’s 2015 High Risk List; DHS http://www.gao.gov/highrisk/strengthening_homeland_security/why_did_study
 GAO 2015 review of DHS CIS Transformation program calling for improved decision analytics & metrics;
http://www.gao.gov/products/GAO-15-415
 GAO 2015 on need to improve effectiveness of program oversight; http://gao.gov/products/GAO-15-292
 IT-AAC Congressional response on IT Acquisition Reform: http://www.it-aac.org/images/IT-AAC_Defense_IT-
Reform_Roadmapv2.0_SignedFinal9-24.pdf
 GAO 2014 review of EAGLE, and need for improved assessment data; http://www.gao.gov/products/GAO-15-551
 GAO 2011 Report on improving DHS IT Program Reviews; http://www.gao.gov/assets/330/322032.pdf
 Rand 2013 Report on reducing Program Costs and Risks;
http://www.rand.org/content/dam/rand/pubs/perspectives/PE100/PE105/RAND_PE105.pdf
 OMB's 25 Point Plan and Agile Contracting Guide; http://www.whitehouse.gov/sites/default/files/omb/procurement/guidance/modular-
approaches-for-information-technology.pdf
 NAS 2011 Rpt on Achieving effective IT Acquisitions http://www.nap.edu/read/12823/chapter/1
 IT-AAC 2010 Congressional Roadmap for Sustainable IT Acquisition Reform signed out by Honorable Mike Wynne, Chairman
Emeritus http://www.it-aac.org/images/ITAACRoadmapCongSumv1.pdf
 Defense Science Board groundbreaking report on Defense IT Acquisition 2009 calling for an Open and Agile Acquisition Process
derived from commercial best practices; http://www.acq.osd.mil/dsb/reports/ADA498375.pdf
 DTIC Monogram 2011: Defense Acquisition, Doing The Same Thing Over and Over Again
http://www.dtic.mil/dtic/tr/fulltext/u2/a522660.pdf
IT-AAC’s Summary Findings
“can’t be fixed with the same thinking that got you there”
“Agile Acquisition” can work if these challenges are addressed:
 BROKEN, INDUSTRIAL AGE ACQUISITION METHODS take too long, cost too much and rarely
deliver and costing $20B/year in avoidable waste
 ILL-EQUIPED IT ACQUISITION CORE: Both government and its SETA/FFRDC contractors lack
Agile Acquisition Methods and IT expertise to be effective. Inexperience and dis-incentives drive
focus on paperwork compliance vs mission outcomes.
 RISK MGT vs RISK AVOIDANCE: Decision adverse culture prevents risk taking. Problem is
compounded by fear of the unknown, and inability to leverage lessons learned from early adopters.
 BARRIERS TO IT INNOVATIONS and BEST PRACTICES: Traditional Federal Sis & FFRDCs are
vested in design-to-spec engineering methods tuned for 20 year weapon system lifecycles.
Dedication to Federal IT market hinders access to design patterns and standards that drive a $4
Trillion dollar global IT Market (of which the DIB represents less than ½ of 1%).
"It is not a great mystery what needs to change, what it takes is the political will and willingness, as Eisenhower possessed, to make
hard choices -- choices that will displease powerful people both inside the Pentagon and out” Defense Secretary Robert Gates
What Others Have Concluded
“ a national security threat if not addressed” DSB
HASC Defense Acquisition Panel 2010
• Only 16% of IT projects are completed on time and on budget.
• 31% are cancelled before completion.
• The remaining 53% are late and over budget, with the typical cost growth exceeding the original budget more
than 89%.
• Of the IT projects that are completed, the final product contains only 61% of the originally specified features
Defense Business Board 2010: Current system hurts effective mission operations
• Architecture makes it nearly impossible to share critical data on a timely basis
• Proprietary systems and closed architecture make in-theatre upgrades difficult
• Lack of common standards make collaboration difficult
• Lack of portable ID forces individuals to be ‘reinvented’ with every change
• Weak These are the final briefing slides as approved by the Defense
• Business Board in the public meeting held January 19, 2012.*
• Security creates need for more enclaves and dedicated networks
Defense Science Board 2009: Fixing the Defense IT Acquisition Process is a matter of national security
• Step back and figure out “what to buy” before focusing on the process of how to buy
• A “few good people” can help make the right decision and move on.
• The change order process is so common, it ensures contractors to bid low and plan to make money on the
inevitable change orders
• Change the concept of “requirements” to “capabilities”
Congressional IT ACQ Reforms
a forcing function needed to drive change
 2010 NDAA Sec 804: “The Secretary of Defense shall develop and implement a new <agile> acquisition process for
information technology systems. The acquisition process developed and implemented pursuant to this subsection shall,
to the extent determined appropriate by the Secretary--
– be designed to include– 1) early and continual involvement of the user; 2) multiple, rapidly executed increments or
releases of capability; 3) early, successive prototyping to support an evolutionary approach; and 4) a modular, open-
systems approach”
 2011 NDAA Sec 933: “The Secretary of Defense, in consultation with the Secretaries of the military departments, shall
develop a strategy to provide for the rapid acquisition of tools, applications, and other capabilities for cyber warfare for
the United States Cyber Command and the cyber operations components of the military departments.
 2012 NDAA: "Migration of Defense data and government-provided services from Department-owned and operated data
centers to cloud computing services generally available within the private sector that provide a better capability at a
lower cost with the same or greater degree of security.”
 2015 NDAA/FITARA: One of the requirements would be that the government develop a streamlined plan for its
acquisitions.[2] The bill would increase the power of existing Chief Information Officers (CIO) within federal agencies so
that they could be more effective.[3] Each agency would also be reduced to having only one CIO in the agency, who is
then responsible for the success and failure of all IT projects in that agency.[4] The bill would also require the federal
government to make use of private sector best practices.[3] The bill is intended to reduce IT procurement related
waste.[5]
 2016 NDAA Agility in Acquisition Act: The bill would require all components conform to open interfaces in order to
plug into the overall system. Module Open Systems Architecture (MOSA) will be based on consensus based standards
(vs Milspec), and apply Evidenced Based Decision Making (a cornerstone of the Acquisition Assurance Method or AAM)
CSF’s for Assured IT/Cyber Outcomes
attributes of an agile “ecosystem”
Transformation Enablers for Sustainable IT Acquisition Reforms;
 Adopt an Agile IT Acquisition Framework like AAM: that brings focus to the critical
decision making data around; execution risk, mission value and lifecycle cost
 Just-In-Time SME Mentoring critical to overcoming cultural resistance to change.
Hundreds of combined years of lessons learned, invaluable in risk mitigating experience.
 Evidence Based Decision Analytics – establish a common data model derived
partnership with AF, DARPA and BTA. Acquisition Assurance Method is the only GSA
Certified Acquisition Framework tuned for the fast paced IT market.
 Solution Architecture Design Patterns – supported by an expansive network of
universities, SDOs, NROs and COPs working together to share best practices, innovations
and lessons learned associated with Cloud, SOA, Large Data, Mobility....
 Public/Private Partnership with commercial IT standards bodies, academia, and non-
traditional innovators outside the reach of the Defense Industrial Base
We wrote the book on
Agile IT Acquisition
11
“. the concept of the Interoperability Clearinghouse is sound and vital. Its developing role as an honest broker of all
interoperability technologies, no matter what the source, is especially needed. Such efforts should be supported by
any organization that wants to stop putting all of its money into maintaining archaic software and obtuse data
formats, and instead start focusing on bottom-line issues of productivity and cost-effective use of information
technology.” OSD Funded Assessment of Interop. Clearinghouse by an FFRDC (MITRE)
12
Mission Needs:
Value Stream
Analysis:
• Problem ID
• Mission Rqts
• Prioritization
• Constraints
Solution
Architecture
Modeling:
• Selection
• Certification
• Interop Spec
• Openness
Industry
CxOs
Innovators
Vendors/ISVs
SDOs/Labs/
Universities
Align Proven
Capabilities w/
business needs
Model New
Solution
Solution Architecture
Validation
and Demonstrations
Value
Stream
Analysis
Proven
IT Solutions
Vetted
Solution
Architecture
Knowledge
Exchange
Prioritized Business
Requirements
Y
N
N
Y
Validated Past
Performance
Measurable Outcomes
Business Metrics
Solution Set
Evidenced -Based Research
Normalized SVC
Components
Analysis of
Alternatives
Solution Exist ?
Service Oriented
Specs and SLAs
COTS Comparative
Analysis, Evidence
Business
Requirements
& Capability
Gaps
Validated Acquisition Strategy,
SLAs & Source Selection Criteria
IT-AAC Communities of Practice
Biz Process
Re-Engineering
InnovationsEvidence
Lessons Learned
Research,
Testing Results
Acquisition Assurance Method (AAM)
Agile Acquisition Framework for Assured Outcomes
Technology Assessments
Course of Actions
Risk Assessments
Performance
Management
Assessment
• Feasibility
• Service Attributes
• SLAs
• Shared Services
Problem
Statement
Capability
Analysis
Capability
Prioritization
Solution
Determination
Economic
Analysis
Roadmap Risk Dashboard
Assessment
AAM Tools
P
h
a
s
e
1
P
h
a
s
e
2
P
h
a
s
e
3
Feasibility
Assessment
An Agile Acquisition “Ecosystem” must consider needs of all stake
holders, and that IT comes in many forms
Baseline
Discovery
Prioritized
Requirements
Service
Specification
Sourcing Strat
AoA/BCA
Performance
Management
Mission Capability/Gap Modeling
(setting the vision, business model, business /solution architecture)
Solution
Architecture
Component Vision and Strategy
(defining the objective, alignment to architecture)
Rapid IT Acquisition Modules
Agency Pre-Acquisition Activities
AAM Acqu Ready
PerformanceObjectives
ValidationandOutcomes
Input
Strategic and Business
Objectives
Output
Product / Capability
1
2
3 4 5 6 7 8
9
Activities 3-8 using AAM typically take 4-6 months and support;
- Baseline Modernization (outside DOD5000 purview)
- Tech Insertion (taking advantage of new tech/upgrades like JIE, UC)
- Reuse of existing service offering (Cloud, Shared Services)
- Commodities; Desktop, Mobile, Storage, Networks, etc
AAM’s Fact Based & Data Driven
Decision Analytics
Problem Statement Prioritized Capabilities Solution Determination Alternatives
Feasibility Assessments & Management Risks Economic Analysis/TCO/ROI) Tradeoff
Road Map
14
Past Performance = Assured Outcomes
Where AAM and IT-AAC have proven: better, faster, cheaper
Navy: Assessment of AFLOAT Program –
CANES SOA & Security Strategy
Contact Value: $350k
Eliminated hi-risk Requirements by
23%, $100Ms in potential savings
USAF: Streamlined COTS Acquisition
Process. Applied to Server Virtualization.
Contract Value: $500k
Established optimal arch with ROI of
450% & $458 million savings
AFISRA: Applied AAM to conduct ISR
Portfolio Risk Assessment (PRA)
Contract Value: $500K
Guiding reorganization and
restructure of ISR Portfolio
DISA CAE: DISN GSM-O Recompete
Restructured performance metrics,
acquisition strategy and SLAs to enable
30% savings on existing DISN Mgt
Greatly Exceeded Forecasted Saving
in both analysis and acquisition
GSA CFO: Financial Mgt System
consolidation using AAM.
Contract Value: $500k
Moved GSA FMS from OMB “red” to
“green”. Eliminated duplicative
investments that saved $200M
BTA DBSAE: Transformed DOD’s
Requirements and Agile process, with 2
successful pilots
Contract Value: $800k
$300 million in potential savings with
minimal investment
Discovery Channel: Apply AAM to
complete AoA and BCA for Enterprise Web
Services/Tactical Cloud
Contract Value: $330k
Provided actionable roadmap for
world wide multi-media web services
GPO: Developed Acquisition Strategy for
Future Digital System FDSys
Contract Value: $150k
Led to successful acquisition and
implementation on time, on budget
and 80% cheaper than NARA RMS
DHS CIO: Agile Acquisition Roadmap
Applying AAM to comply with
NDAA/FITARA IT Reform Directives
Partnered with DHS FFRDC to shift
DHS away from failed weapon
systems approach to IT acquisition
“we believe that it is necessary to develop a comprehensive set of metrics to give transparency to program execution, avoid subjective judgment, and
avoid the wasting of time in both executing commands and in oversight offices. This is consistent with the fundamental recommendations of the Packard
Commission and Secretary Robert Gates’s initiative to eliminate inefficiency and waste.” PARCA-RAND Root Cause Analysis of Nunn-McCurdy Breaches
Predictable Outcomes
from embracing Agile Acquisition
How ICH and IT-AAC can reduce barriers to innovation and mitigate risks;
 Means of leveraging collective investments and process improvements created by over 22 Intl
Standards Bodies, NGOs and Commercial IT communities of practice, (prevents NIH)
 Improved CIO/CTO Agility and Effectiveness of IT investments, agile methods and dashboard tools
proven to meet challenges of the fast paced IT market (AAM is the only conforming to-date)
 Greater access to commercial IT/Cyber innovations, best practices and lessons learned
emanating from a$3.9T Global IT market, outside the reach of the Defense Industrial Complex
 Access to an infinitely elastic Just-in-Time SMEs and Though Leaders when you need them
at a fraction of the cost of butts-in-seats approach typical of this market.
17
Backup Slides
in case you are not convinced
"“If confirmed, I would review the implementation of Section 804 and make any necessary recommendations for improvement. …If confirmed, I would
work to identify the root causes of the Department’s software development problems, identify solutions and implement appropriate corrective action.”
Honorable Frank Kendall Senate Confirmation Statement, OSD ATL 2012
How IT-AAC Empowers MOSA/BBP/JIE
1.1. Enterprise Architecture. Leverage IT-AAC Benchmarked SOA Best Practices and Architecture Design Patterns.
1.3. Common Standards. IT-AAC’s provides direct access to the worlds leading Standards Partners and Standards of
Practice of a $3.8Trillion market. Cost savings alone from IT-AAC investment is over $3.5M/year
3.2. Efficient Business Operations. IT-AAC’s can provide ICH a conduit to body of knowledge and Global 1000 best
practices and lessons learned, helping avert common failure patterns and vendor hype.
4.1. Strategic Oversight. The Acquisition Assurance Method (AAM) is a DoD proven, robust Decision Analytics
Framework that has been successfully applied across DoD and Civil Agencies, driving measurable outcomes.
4.2. Performance Management. IT-AAC’s Standards Partners have ready to adopt SLAs and Performance Metrics to
assure the acquisition lifecycle and mitigate risk.
4.3. Portfolio and Investment Management. agencies can leverage IT-AAC’s public/private partnership to capture
benchmarked best practice and lessons learned captured from Telecom, Finance, Aerospace, Logistics and
Manufacturing communities
5.0 Enhance trusted partnerships to better leverage innovative. IT-AAC provide significant economies of scale thru
reuse around tech assessments, performance metrics, SLAs, and innovation research. IT-AAC’s public/private
partnership leverages the combined investments/research of academia, standards bodies, innovators and non-traditional
communities of practice
“Drive for stable requirements and funding. Use mature technologies, or fund and manage technology development rigorously. Demand domain credentials
and experience in both government and industry teams. Insist on transparency. And conduct regular independent reviews.” Al Munson Jr, first director of
U.S. national intelligence, acquisition and technology
Case Study: Streamlining the DoD’s IT
Acquisition for Infrastructure
Challenge: Establish OSD BTA’s Agile Acquisition Method for IT Infrastructure (SOA)
 Applied ICH’s Acquisition Assurance Method (AAM) standard
– Developed IT Business Systems lifecycle entry/exit criteria for great transparency
– Established enhanced Clinger Cohen Act process guide for OSD BTA CIO
– Developed Value Chain Capability Assessment Methodology (CAM)
– Established IT Acquisition Advisory Council to overcome cultural impediments.
 Outcomes; IT Acquisition Reform we can believe in
– Complemented Business Capability Lifecycle (BCL), providing analytical tools for framing
decisions
– Enabled actionable Clinger Cohen Act compliance that goes beyond check list
– Enabled Component Acquisition Executive with means of judging business value of IT
investments
– Provided OSD BTA with alternative approach to DoD weapons systems style processes
– Used to conduct Pre-milestone B “Hosting” AoA and Business Case Analysis in just 4 months.
Projected Savings = $350M over 5 years.
Office of the Secretary of Defense, DCIO (2001) ”Since the value of the ICH to our programs increases
rapidly through results sharing, we encourage the defense community and IT industry to participate directly in
the public service initiative in terms of sponsorship and lessons learned"
Challenge: Establish a common and repeatable AF Wide COTS assessment/acquisition process
Case Study:
Streamlining the IT Acquisition process
SAF XC/AQ; AF Solution Assessment Process (ASAP)
 Integrated ICH Architecture Assurance Method into all major AF IT components
– Developed root cause of analysis of current weaknesses and deficiencies
– Identified and integrated both AF and industry best practices into a common framework
– Developed series of templates and input/exist criteria for each stage of the SDLC process
 Outcomes: Increased traceability from requirements to acquisition, reducing “thrashing”
– Provided a common, enterprise wide process designed for leveraging COTS
– Augmented architecture process to address legacy and COTS capabilities
– Reduce market research and analysis in a fraction of the cost and time by leveraging existing
expertise and lessons learned of the market
– Provided mechanisms for forcing adoption of 80% solution.
“We have put to practice the AF Solution Assessment Process (ASAP) at the Air Force Communications Agency (AFCA) with some well
documented success. It was developed with Interoperability Clearinghouse (ICH) and provides a structured and measurable IT
assessment process with the agility to provide decision-quality assessments ranging from quick-looks to more in-depth capability-focused
technology assessments and lightweight business case analysis.” General Mike Peterson, AF CIO
Challenge: Establish a enterprise ship board SOA infrastructure for all
shipboard legacy systems
Case Study:
Validating SOA and Cross Domain Solutions
Navy PMW 160 Consolidated Afloat Network
Enterprise (CANES)
 Establish an actionable solution architecture that leverages SOA & COTS implementation best
practices
– Provide a standardized Solution Assessment Methodology to leverage best practices and mitigate
deployment risk (compliment NESI).
– Establishes a Solution Architecture standard and public/private research partnership that
maximizes use of commercial trends (COTS/Open Source solutions) via an actionable Open
Architecture (OA)
– Enable Capability Based Acquisitions. Reveal Gaps in both requirement and industry offerings
(define realm of the possible).
– Establish SOA performance metrics and SLAs that reflect real world limitations and hold
suppliers accountable.
 Outcomes of ICH engagement (reduced requirements over specification by 23%);
– Proved out as a standardized IT Assessment & Solution Architecture process that will mitigate
deployment risk.
– AAM assessment products used:
Capability Determination and Metrics
Service Component Prioritization and Alignment and
Feasibility/Risk Assessment
– Demonstrated the feasibility and viability of using GOTS/COTS/Open Source products within
the CANES Architecture
– Demonstrated a method and a plan to:
Assess SOA Service Components for CANES
Assess migration to Netcentric “need-to-share” systems
Produced a large body of artifacts that are important for the architecture phase
Challenge: Defense Agile Acquisition Framework & SOA E.H.R. Best Practices Guidance
Established Section 804 Agile Acquisition Framework for E.H.R Way Forward
– Developed source selection criteria for TMA Program Office
– Benchmarked SOA/Cloud Industry Best Practices and Lessons Learned with support from 10 Fortune 100
companies
– Built out a proven Agile Framework fully vetted by BTA (Acquisition Assurance Method)
Outcomes: Established SOA Roadmap that addressed stake holder needs
– Enabled award based on unambiguous design specs
– Augmented architecture process to address legacy and COTS SOA/ESB capabilities
– Was able to cycle through market research and analysis in a fraction of the cost and time of traditional
efforts.
– Ensured viability of Solution Architecture in terms of; meeting HIPPA, security, and interoperability
requirements
Case Study: World Largest Healthcare Agency
OSD HA’s Government Wide e-Healthcare program
“The ICH repository data and analysis methodologies was very helpful in supporting a quick turn
around for [Information Assurance] section of COTS security products. Highly detailed ICH
technology domain and product evaluation data comprised over 60% of this urgently needed
[architecture] report”. Northrop Grumman on ICH’s support of their successful GCPR Pilot

Más contenido relacionado

La actualidad más candente

2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)Danny Miller
 
It staff augmentation before and after covid 19
It staff augmentation  before and after covid 19It staff augmentation  before and after covid 19
It staff augmentation before and after covid 19Katy Slemon
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementCHRIS CLIFFORD
 
Vision 2030: A Connected Future
Vision 2030: A Connected FutureVision 2030: A Connected Future
Vision 2030: A Connected FutureWipro Digital
 
The realist’s guide to quantum technology and national security
The realist’s guide to quantum technology and national securityThe realist’s guide to quantum technology and national security
The realist’s guide to quantum technology and national securityDeloitte United States
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFEJames Wier
 
Weiler slideshow
Weiler slideshowWeiler slideshow
Weiler slideshowvjairam
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energystacybre
 
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar  CIC Qatar 2018 AgendaiFluids Cybersecurity Seminar  CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar CIC Qatar 2018 AgendaJohn Kingsley
 
Mobile security decision framework
Mobile security decision frameworkMobile security decision framework
Mobile security decision frameworkVishal Sharma
 
Accelerating Your Digital Strategy
Accelerating Your Digital StrategyAccelerating Your Digital Strategy
Accelerating Your Digital StrategyFrancisco Soto
 
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsAttaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsSustainable Brands
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTheAnfieldGroup
 
Intel Corporation Award Write Up
Intel Corporation Award Write UpIntel Corporation Award Write Up
Intel Corporation Award Write UpClaudia Toscano
 
Integration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governanceIntegration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governanceVishal Sharma
 
Computer Application in Insurance Industry of Bangladesh
Computer Application in Insurance Industry of BangladeshComputer Application in Insurance Industry of Bangladesh
Computer Application in Insurance Industry of BangladeshFahim Rokon
 
William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...centralohioissa
 
IOT Platform as a Service
IOT Platform as a ServiceIOT Platform as a Service
IOT Platform as a Servicekidozen
 

La actualidad más candente (20)

2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
 
It staff augmentation before and after covid 19
It staff augmentation  before and after covid 19It staff augmentation  before and after covid 19
It staff augmentation before and after covid 19
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
 
Vision 2030: A Connected Future
Vision 2030: A Connected FutureVision 2030: A Connected Future
Vision 2030: A Connected Future
 
The fourth industrial revolution
The fourth industrial revolutionThe fourth industrial revolution
The fourth industrial revolution
 
The realist’s guide to quantum technology and national security
The realist’s guide to quantum technology and national securityThe realist’s guide to quantum technology and national security
The realist’s guide to quantum technology and national security
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
Weiler slideshow
Weiler slideshowWeiler slideshow
Weiler slideshow
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar  CIC Qatar 2018 AgendaiFluids Cybersecurity Seminar  CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
 
Mobile security decision framework
Mobile security decision frameworkMobile security decision framework
Mobile security decision framework
 
Accelerating Your Digital Strategy
Accelerating Your Digital StrategyAccelerating Your Digital Strategy
Accelerating Your Digital Strategy
 
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsAttaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, Ercot
 
Intel Corporation Award Write Up
Intel Corporation Award Write UpIntel Corporation Award Write Up
Intel Corporation Award Write Up
 
Integration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governanceIntegration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governance
 
Computer Application in Insurance Industry of Bangladesh
Computer Application in Insurance Industry of BangladeshComputer Application in Insurance Industry of Bangladesh
Computer Application in Insurance Industry of Bangladesh
 
William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...
 
IOT Platform as a Service
IOT Platform as a ServiceIOT Platform as a Service
IOT Platform as a Service
 

Destacado

Master Source-to-Pay with Cloud and Business Networks [Stockholm]
Master Source-to-Pay with Cloud and Business Networks [Stockholm]Master Source-to-Pay with Cloud and Business Networks [Stockholm]
Master Source-to-Pay with Cloud and Business Networks [Stockholm]SAP Ariba
 
Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016Arthit Kliangprom
 
Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Presidio Networked Solutions Sales Presentation Ns Ppt 1108Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Presidio Networked Solutions Sales Presentation Ns Ppt 1108mmata1031
 
DLT Solutions interview questions and answers
DLT Solutions interview questions and answersDLT Solutions interview questions and answers
DLT Solutions interview questions and answersgetbrid665
 
Makram thesis presentation
Makram thesis presentationMakram thesis presentation
Makram thesis presentationabdelqad
 
Odroid Magazine March 2014
Odroid Magazine March 2014Odroid Magazine March 2014
Odroid Magazine March 2014Nanik Tolaram
 
Solaris vs Linux
Solaris vs LinuxSolaris vs Linux
Solaris vs LinuxGrigale LTD
 
Cross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersCross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersDLT Solutions
 
Carahsoft technology interview questions and answers
Carahsoft technology interview questions and answersCarahsoft technology interview questions and answers
Carahsoft technology interview questions and answersKeisukeHonda66
 
Presentación Ecopetrol
Presentación EcopetrolPresentación Ecopetrol
Presentación EcopetrolEricka Chavez
 
AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015Ross McLendon
 
Bradley McKinney Resume 8 Dec 2016
Bradley McKinney Resume 8 Dec 2016Bradley McKinney Resume 8 Dec 2016
Bradley McKinney Resume 8 Dec 2016Bradley McKinney
 
Oracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Oracle and Cast Iron Systems: Delivering an Integrated CRM ExperienceOracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Oracle and Cast Iron Systems: Delivering an Integrated CRM ExperienceSean O'Connell
 
Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15jdestefano
 
AQSIQ Successful Cases
AQSIQ Successful CasesAQSIQ Successful Cases
AQSIQ Successful CasesAQSIQ license
 
Microbial Limit Test- An Over view
Microbial Limit Test- An Over view Microbial Limit Test- An Over view
Microbial Limit Test- An Over view Srinath Sasidharan
 
Social Studies - The 1990 Iraq-Kuwait War
Social Studies - The 1990 Iraq-Kuwait WarSocial Studies - The 1990 Iraq-Kuwait War
Social Studies - The 1990 Iraq-Kuwait WarGoh Bang Rui
 

Destacado (20)

Master Source-to-Pay with Cloud and Business Networks [Stockholm]
Master Source-to-Pay with Cloud and Business Networks [Stockholm]Master Source-to-Pay with Cloud and Business Networks [Stockholm]
Master Source-to-Pay with Cloud and Business Networks [Stockholm]
 
Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016Snr Systems Engineer ArthitK_CVMar2016
Snr Systems Engineer ArthitK_CVMar2016
 
Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Presidio Networked Solutions Sales Presentation Ns Ppt 1108Presidio Networked Solutions Sales Presentation Ns Ppt 1108
Presidio Networked Solutions Sales Presentation Ns Ppt 1108
 
Summary of smart building
Summary of smart buildingSummary of smart building
Summary of smart building
 
DLT Solutions interview questions and answers
DLT Solutions interview questions and answersDLT Solutions interview questions and answers
DLT Solutions interview questions and answers
 
Makram thesis presentation
Makram thesis presentationMakram thesis presentation
Makram thesis presentation
 
Odroid Magazine March 2014
Odroid Magazine March 2014Odroid Magazine March 2014
Odroid Magazine March 2014
 
Solaris vs Linux
Solaris vs LinuxSolaris vs Linux
Solaris vs Linux
 
Cross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersCross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling Computers
 
Carahsoft technology interview questions and answers
Carahsoft technology interview questions and answersCarahsoft technology interview questions and answers
Carahsoft technology interview questions and answers
 
Presentación Ecopetrol
Presentación EcopetrolPresentación Ecopetrol
Presentación Ecopetrol
 
AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015AMA commercial presentation-PASU-R4 2015
AMA commercial presentation-PASU-R4 2015
 
Bradley McKinney Resume 8 Dec 2016
Bradley McKinney Resume 8 Dec 2016Bradley McKinney Resume 8 Dec 2016
Bradley McKinney Resume 8 Dec 2016
 
NMRESGI_El Paso Electric Grid Modernization_Bukowski
NMRESGI_El Paso Electric Grid Modernization_BukowskiNMRESGI_El Paso Electric Grid Modernization_Bukowski
NMRESGI_El Paso Electric Grid Modernization_Bukowski
 
Oracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Oracle and Cast Iron Systems: Delivering an Integrated CRM ExperienceOracle and Cast Iron Systems: Delivering an Integrated CRM Experience
Oracle and Cast Iron Systems: Delivering an Integrated CRM Experience
 
Cfmc pumps
Cfmc pumpsCfmc pumps
Cfmc pumps
 
Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15Presidio Networked Solutions Updated 12 15
Presidio Networked Solutions Updated 12 15
 
AQSIQ Successful Cases
AQSIQ Successful CasesAQSIQ Successful Cases
AQSIQ Successful Cases
 
Microbial Limit Test- An Over view
Microbial Limit Test- An Over view Microbial Limit Test- An Over view
Microbial Limit Test- An Over view
 
Social Studies - The 1990 Iraq-Kuwait War
Social Studies - The 1990 Iraq-Kuwait WarSocial Studies - The 1990 Iraq-Kuwait War
Social Studies - The 1990 Iraq-Kuwait War
 

Similar a IT-AAC Defense IT Reform Report to the Sec 809 Panel

Hacking the 5000 – Procurement Contracting Officer (PCO) View
Hacking the 5000 – Procurement Contracting Officer (PCO) ViewHacking the 5000 – Procurement Contracting Officer (PCO) View
Hacking the 5000 – Procurement Contracting Officer (PCO) ViewGovernment Contract Pricing Summit
 
Technology Directors on Corporate Boards October 2013
Technology Directors on Corporate Boards October 2013Technology Directors on Corporate Boards October 2013
Technology Directors on Corporate Boards October 2013Vell Executive Search
 
IAOP Chicago Chapter April 28
IAOP Chicago Chapter April 28IAOP Chicago Chapter April 28
IAOP Chicago Chapter April 28curtherge
 
What's Next with Government Big Data
What's Next with Government Big Data What's Next with Government Big Data
What's Next with Government Big Data GovLoop
 
OSD ATL class on Agile Acquisition
OSD ATL class on Agile AcquisitionOSD ATL class on Agile Acquisition
OSD ATL class on Agile AcquisitionJohn Weiler
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...John Gilligan
 
10 Steps for Taking Control of Your Organization's Digital Debris
10 Steps for Taking Control of Your Organization's Digital Debris 10 Steps for Taking Control of Your Organization's Digital Debris
10 Steps for Taking Control of Your Organization's Digital Debris Perficient, Inc.
 
Beyond Predictive and Preventive Maintenance
Beyond Predictive and Preventive MaintenanceBeyond Predictive and Preventive Maintenance
Beyond Predictive and Preventive MaintenanceHarshad Shah
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. ManufacturingIgnyte Assurance Platform
 
Project Management and Defense Acquisition
Project Management and Defense AcquisitionProject Management and Defense Acquisition
Project Management and Defense AcquisitionSpace Foundation
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelPaul Di Gangi
 
Itsm Fusion Final
Itsm Fusion FinalItsm Fusion Final
Itsm Fusion Finaldjaehnig
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsIgnyte Assurance Platform
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deckRichard (Dick) Kaufman
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018 David Germain
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Amazon Web Services
 
GSA Asia Pacific Executive Summit 2019, Taipei, Taiwan
GSA Asia Pacific Executive Summit 2019, Taipei, TaiwanGSA Asia Pacific Executive Summit 2019, Taipei, Taiwan
GSA Asia Pacific Executive Summit 2019, Taipei, TaiwanJohn Ciacchella
 

Similar a IT-AAC Defense IT Reform Report to the Sec 809 Panel (20)

Hacking the 5000 – Procurement Contracting Officer (PCO) View
Hacking the 5000 – Procurement Contracting Officer (PCO) ViewHacking the 5000 – Procurement Contracting Officer (PCO) View
Hacking the 5000 – Procurement Contracting Officer (PCO) View
 
Technology Directors on Corporate Boards October 2013
Technology Directors on Corporate Boards October 2013Technology Directors on Corporate Boards October 2013
Technology Directors on Corporate Boards October 2013
 
IAOP Chicago Chapter April 28
IAOP Chicago Chapter April 28IAOP Chicago Chapter April 28
IAOP Chicago Chapter April 28
 
What's Next with Government Big Data
What's Next with Government Big Data What's Next with Government Big Data
What's Next with Government Big Data
 
OSD ATL class on Agile Acquisition
OSD ATL class on Agile AcquisitionOSD ATL class on Agile Acquisition
OSD ATL class on Agile Acquisition
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
 
10 Steps for Taking Control of Your Organization's Digital Debris
10 Steps for Taking Control of Your Organization's Digital Debris 10 Steps for Taking Control of Your Organization's Digital Debris
10 Steps for Taking Control of Your Organization's Digital Debris
 
Beyond Predictive and Preventive Maintenance
Beyond Predictive and Preventive MaintenanceBeyond Predictive and Preventive Maintenance
Beyond Predictive and Preventive Maintenance
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
Project Management and Defense Acquisition
Project Management and Defense AcquisitionProject Management and Defense Acquisition
Project Management and Defense Acquisition
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Itsm Fusion Final
Itsm Fusion FinalItsm Fusion Final
Itsm Fusion Final
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
 
Asc overview 7 8-13
Asc overview 7 8-13Asc overview 7 8-13
Asc overview 7 8-13
 
Snapshot UK CIO 2018
Snapshot UK CIO 2018 Snapshot UK CIO 2018
Snapshot UK CIO 2018
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
 
GSA Asia Pacific Executive Summit 2019, Taipei, Taiwan
GSA Asia Pacific Executive Summit 2019, Taipei, TaiwanGSA Asia Pacific Executive Summit 2019, Taipei, Taiwan
GSA Asia Pacific Executive Summit 2019, Taipei, Taiwan
 

Más de John Weiler

Why DOD is Woefully Behind in IT
Why DOD is Woefully Behind in ITWhy DOD is Woefully Behind in IT
Why DOD is Woefully Behind in ITJohn Weiler
 
Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016John Weiler
 
Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing John Weiler
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalJohn Weiler
 
INSA_ IT-AAC MOU
INSA_ IT-AAC MOUINSA_ IT-AAC MOU
INSA_ IT-AAC MOUJohn Weiler
 
Congressional it reform-roadmap_2011
Congressional it reform-roadmap_2011Congressional it reform-roadmap_2011
Congressional it reform-roadmap_2011John Weiler
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013John Weiler
 

Más de John Weiler (9)

Why DOD is Woefully Behind in IT
Why DOD is Woefully Behind in ITWhy DOD is Woefully Behind in IT
Why DOD is Woefully Behind in IT
 
Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016
 
Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing
 
Lungren Letter
Lungren LetterLungren Letter
Lungren Letter
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_final
 
OSD letter
OSD letterOSD letter
OSD letter
 
INSA_ IT-AAC MOU
INSA_ IT-AAC MOUINSA_ IT-AAC MOU
INSA_ IT-AAC MOU
 
Congressional it reform-roadmap_2011
Congressional it reform-roadmap_2011Congressional it reform-roadmap_2011
Congressional it reform-roadmap_2011
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013
 

Último

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Último (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

IT-AAC Defense IT Reform Report to the Sec 809 Panel

  • 1. ICH and IT-AAC Agents of Change “A public/private partnership operating as an honest broker for IT Innovations, Standards of Practice, Agile Methods, and just-in-time expertise outside the reach of the Defense Industrial Base” Honorable Dale Meyerrose, former DNI CIO VADM Kevin Green, former Deputy CNO, IT-AAC Exec Director LTGen Ted Bowlds, former AF ESC CMDR, IT-AAC Vice Chair Dr. Marv Langston, former Navy & DOD CIO, IT-AAC Fellow John Weiler, CIO & Managing Director, IT-AAC www.IT-AAC.org www.ICHnet.org 703 768 0400 Roadmap for Agile IT Management & Modernization: Measuring Risk & Business Value of IT Investments at the speed of need
  • 2. Assuring IT Enabled Outcomes exposing innovations & standards of Global IT market  IT-AAC 501c3 Consortia of Standards Bodies, Academia, Think Tanks and Non- Defense COIs. Greybeard Council Focus on sharing Commercial IT best practices and lessons learned Conduit to reaching over 20k innovative companies Reach core of $3.77 Trillion Global IT Market Critical source for Open Architectures and Standards; SDN, SOA, Cloud, IA, Mobile, ITIL/COBIT, Internet of Things Interop. ClearingHouse 501c6 DOD Chartered Non-profit research institute  Focus on measures and metrics for interoperability, security, service levels, commerciality & risk. Resource for mentoring government transformation efforts Proven maturity model for Agile Acquisition, Tech Assessment and Business Case Analysis Superior source for risk based decision making Conflict free, no rice bowls
  • 3. IT-AAC’s Collaborative Approach to Reforming and Assuring IT/Cyber  Repurposed over 40 existing body of evidence; DSB, DBB, BENS, GAO, HASC, CRS, NDIA, ACT/IAC, NAS, AF-SAB ….  Recruited the best, most experienced thought leaders  Partnered with over 20 leading industry COIs, avoid vested interests/status quo (SDOs, NGOs, EDUs)  Conducted 50+ Leadership Workshops, reaching 3,000+  Supported a dozen successful Agile Acquisition Pilots,… proving that there is a better way to acquire time sensitive IT/Cyber Capabilities
  • 4. IT-AAC Acquisition Swat Team Tapping the Best and Brightest SMEs Honorable Jack Gansler PhD, former DUSD, ATL, IT-AAC Chairman Honorable David Walker, former GAO Comptroller General VADM Kevin Green, former Deputy CNO Honorable Dov Zakheim, former USD, Comptroller Honorable Duane Andrews, former ASD C3I Honorable John Grimes, former ASD NII Honorable Dale Meyerrose, MGEN, former DNI CIO General Paul Kern, USA Ret, former Army AMC Commander, Cohen Group LtGen Dave Deptula USAF Ret, Former USAF Deputy Chief of Staff, ISR VADM Dave Oliver, former EADS COO LtGen Bill Campbell, former Army CIO LtGen Ted Bowlds USAF Ret, former AF ESC Commander Dr. Marv Langston, former DOD Deputy CIO & Navy CIO Kevin Carroll, former Army PEO EIS Director John Carrow, former DNI Deputy CIO & Unisys Corp. CIO John Weiler, Managing Director & CIO, IT-AAC Plus 1,100 delegates emanating from our public/private partnership
  • 5. IT-AAC Communities of Practice reaching over 108k innovators
  • 6. Defense IT Acquisition Ecosystem is Broken and can’t be fixed with the same thinking that got us there! Acquisition Lifecycle • Long acquisition cycle-times • Successive layers … built over years • Limited flexibility and agility • Risk Management is Deficient Requirements • Understanding and prioritizing requirements • Ineffective role and comm in acquisitions Test/Evaluation • Testing is integrated too late and serially • Lack of automated testing Funding & Governance • Program-centric, not capability-centric • Overlapping decision layers (e.g., multiple review processes) • Lack of customer-driven metrics • Funding inflexibility & negative incentives “The inability to effectively acquire information technology systems is critical to national security. Thus, the many challenges surrounding information technology must be addressed if DOD is to remain a military leader in the future. The development of a new acquisition process, coupled with clear roles and responsibilities of key decision makers, and an experienced leadership and workforce, are important elements of the solution.” Defense Science Board Report to Congress
  • 7. Body of Evidence (cont) Continuing the same process is both expensive and insane  ALF and SELC Documentation and Case Studies  Updated OMB A-130 Guidance; https://www.whitehouse.gov/sites/default/files/omb/assets/omb/circulars/a130/a130trans4.pdf  Federal IT Acquisition Reform Act. http://oversight.house.gov/wp-content/uploads/2012/09/9-20-12-Draft-Issa-Oversight-Committee-IT- Procurement-Reform-Bill1.pdf  GAO’s 2015 update on DHS IT Acquisition Challenges: http://www.gao.gov/products/GAO-15-171SP  GAO’s 2015 High Risk List; DHS http://www.gao.gov/highrisk/strengthening_homeland_security/why_did_study  GAO 2015 review of DHS CIS Transformation program calling for improved decision analytics & metrics; http://www.gao.gov/products/GAO-15-415  GAO 2015 on need to improve effectiveness of program oversight; http://gao.gov/products/GAO-15-292  IT-AAC Congressional response on IT Acquisition Reform: http://www.it-aac.org/images/IT-AAC_Defense_IT- Reform_Roadmapv2.0_SignedFinal9-24.pdf  GAO 2014 review of EAGLE, and need for improved assessment data; http://www.gao.gov/products/GAO-15-551  GAO 2011 Report on improving DHS IT Program Reviews; http://www.gao.gov/assets/330/322032.pdf  Rand 2013 Report on reducing Program Costs and Risks; http://www.rand.org/content/dam/rand/pubs/perspectives/PE100/PE105/RAND_PE105.pdf  OMB's 25 Point Plan and Agile Contracting Guide; http://www.whitehouse.gov/sites/default/files/omb/procurement/guidance/modular- approaches-for-information-technology.pdf  NAS 2011 Rpt on Achieving effective IT Acquisitions http://www.nap.edu/read/12823/chapter/1  IT-AAC 2010 Congressional Roadmap for Sustainable IT Acquisition Reform signed out by Honorable Mike Wynne, Chairman Emeritus http://www.it-aac.org/images/ITAACRoadmapCongSumv1.pdf  Defense Science Board groundbreaking report on Defense IT Acquisition 2009 calling for an Open and Agile Acquisition Process derived from commercial best practices; http://www.acq.osd.mil/dsb/reports/ADA498375.pdf  DTIC Monogram 2011: Defense Acquisition, Doing The Same Thing Over and Over Again http://www.dtic.mil/dtic/tr/fulltext/u2/a522660.pdf
  • 8. IT-AAC’s Summary Findings “can’t be fixed with the same thinking that got you there” “Agile Acquisition” can work if these challenges are addressed:  BROKEN, INDUSTRIAL AGE ACQUISITION METHODS take too long, cost too much and rarely deliver and costing $20B/year in avoidable waste  ILL-EQUIPED IT ACQUISITION CORE: Both government and its SETA/FFRDC contractors lack Agile Acquisition Methods and IT expertise to be effective. Inexperience and dis-incentives drive focus on paperwork compliance vs mission outcomes.  RISK MGT vs RISK AVOIDANCE: Decision adverse culture prevents risk taking. Problem is compounded by fear of the unknown, and inability to leverage lessons learned from early adopters.  BARRIERS TO IT INNOVATIONS and BEST PRACTICES: Traditional Federal Sis & FFRDCs are vested in design-to-spec engineering methods tuned for 20 year weapon system lifecycles. Dedication to Federal IT market hinders access to design patterns and standards that drive a $4 Trillion dollar global IT Market (of which the DIB represents less than ½ of 1%). "It is not a great mystery what needs to change, what it takes is the political will and willingness, as Eisenhower possessed, to make hard choices -- choices that will displease powerful people both inside the Pentagon and out” Defense Secretary Robert Gates
  • 9. What Others Have Concluded “ a national security threat if not addressed” DSB HASC Defense Acquisition Panel 2010 • Only 16% of IT projects are completed on time and on budget. • 31% are cancelled before completion. • The remaining 53% are late and over budget, with the typical cost growth exceeding the original budget more than 89%. • Of the IT projects that are completed, the final product contains only 61% of the originally specified features Defense Business Board 2010: Current system hurts effective mission operations • Architecture makes it nearly impossible to share critical data on a timely basis • Proprietary systems and closed architecture make in-theatre upgrades difficult • Lack of common standards make collaboration difficult • Lack of portable ID forces individuals to be ‘reinvented’ with every change • Weak These are the final briefing slides as approved by the Defense • Business Board in the public meeting held January 19, 2012.* • Security creates need for more enclaves and dedicated networks Defense Science Board 2009: Fixing the Defense IT Acquisition Process is a matter of national security • Step back and figure out “what to buy” before focusing on the process of how to buy • A “few good people” can help make the right decision and move on. • The change order process is so common, it ensures contractors to bid low and plan to make money on the inevitable change orders • Change the concept of “requirements” to “capabilities”
  • 10. Congressional IT ACQ Reforms a forcing function needed to drive change  2010 NDAA Sec 804: “The Secretary of Defense shall develop and implement a new <agile> acquisition process for information technology systems. The acquisition process developed and implemented pursuant to this subsection shall, to the extent determined appropriate by the Secretary-- – be designed to include– 1) early and continual involvement of the user; 2) multiple, rapidly executed increments or releases of capability; 3) early, successive prototyping to support an evolutionary approach; and 4) a modular, open- systems approach”  2011 NDAA Sec 933: “The Secretary of Defense, in consultation with the Secretaries of the military departments, shall develop a strategy to provide for the rapid acquisition of tools, applications, and other capabilities for cyber warfare for the United States Cyber Command and the cyber operations components of the military departments.  2012 NDAA: "Migration of Defense data and government-provided services from Department-owned and operated data centers to cloud computing services generally available within the private sector that provide a better capability at a lower cost with the same or greater degree of security.”  2015 NDAA/FITARA: One of the requirements would be that the government develop a streamlined plan for its acquisitions.[2] The bill would increase the power of existing Chief Information Officers (CIO) within federal agencies so that they could be more effective.[3] Each agency would also be reduced to having only one CIO in the agency, who is then responsible for the success and failure of all IT projects in that agency.[4] The bill would also require the federal government to make use of private sector best practices.[3] The bill is intended to reduce IT procurement related waste.[5]  2016 NDAA Agility in Acquisition Act: The bill would require all components conform to open interfaces in order to plug into the overall system. Module Open Systems Architecture (MOSA) will be based on consensus based standards (vs Milspec), and apply Evidenced Based Decision Making (a cornerstone of the Acquisition Assurance Method or AAM)
  • 11. CSF’s for Assured IT/Cyber Outcomes attributes of an agile “ecosystem” Transformation Enablers for Sustainable IT Acquisition Reforms;  Adopt an Agile IT Acquisition Framework like AAM: that brings focus to the critical decision making data around; execution risk, mission value and lifecycle cost  Just-In-Time SME Mentoring critical to overcoming cultural resistance to change. Hundreds of combined years of lessons learned, invaluable in risk mitigating experience.  Evidence Based Decision Analytics – establish a common data model derived partnership with AF, DARPA and BTA. Acquisition Assurance Method is the only GSA Certified Acquisition Framework tuned for the fast paced IT market.  Solution Architecture Design Patterns – supported by an expansive network of universities, SDOs, NROs and COPs working together to share best practices, innovations and lessons learned associated with Cloud, SOA, Large Data, Mobility....  Public/Private Partnership with commercial IT standards bodies, academia, and non- traditional innovators outside the reach of the Defense Industrial Base
  • 12. We wrote the book on Agile IT Acquisition 11 “. the concept of the Interoperability Clearinghouse is sound and vital. Its developing role as an honest broker of all interoperability technologies, no matter what the source, is especially needed. Such efforts should be supported by any organization that wants to stop putting all of its money into maintaining archaic software and obtuse data formats, and instead start focusing on bottom-line issues of productivity and cost-effective use of information technology.” OSD Funded Assessment of Interop. Clearinghouse by an FFRDC (MITRE)
  • 13. 12 Mission Needs: Value Stream Analysis: • Problem ID • Mission Rqts • Prioritization • Constraints Solution Architecture Modeling: • Selection • Certification • Interop Spec • Openness Industry CxOs Innovators Vendors/ISVs SDOs/Labs/ Universities Align Proven Capabilities w/ business needs Model New Solution Solution Architecture Validation and Demonstrations Value Stream Analysis Proven IT Solutions Vetted Solution Architecture Knowledge Exchange Prioritized Business Requirements Y N N Y Validated Past Performance Measurable Outcomes Business Metrics Solution Set Evidenced -Based Research Normalized SVC Components Analysis of Alternatives Solution Exist ? Service Oriented Specs and SLAs COTS Comparative Analysis, Evidence Business Requirements & Capability Gaps Validated Acquisition Strategy, SLAs & Source Selection Criteria IT-AAC Communities of Practice Biz Process Re-Engineering InnovationsEvidence Lessons Learned Research, Testing Results Acquisition Assurance Method (AAM) Agile Acquisition Framework for Assured Outcomes Technology Assessments Course of Actions Risk Assessments Performance Management Assessment • Feasibility • Service Attributes • SLAs • Shared Services Problem Statement Capability Analysis Capability Prioritization Solution Determination Economic Analysis Roadmap Risk Dashboard Assessment AAM Tools P h a s e 1 P h a s e 2 P h a s e 3 Feasibility Assessment
  • 14. An Agile Acquisition “Ecosystem” must consider needs of all stake holders, and that IT comes in many forms Baseline Discovery Prioritized Requirements Service Specification Sourcing Strat AoA/BCA Performance Management Mission Capability/Gap Modeling (setting the vision, business model, business /solution architecture) Solution Architecture Component Vision and Strategy (defining the objective, alignment to architecture) Rapid IT Acquisition Modules Agency Pre-Acquisition Activities AAM Acqu Ready PerformanceObjectives ValidationandOutcomes Input Strategic and Business Objectives Output Product / Capability 1 2 3 4 5 6 7 8 9 Activities 3-8 using AAM typically take 4-6 months and support; - Baseline Modernization (outside DOD5000 purview) - Tech Insertion (taking advantage of new tech/upgrades like JIE, UC) - Reuse of existing service offering (Cloud, Shared Services) - Commodities; Desktop, Mobile, Storage, Networks, etc
  • 15. AAM’s Fact Based & Data Driven Decision Analytics Problem Statement Prioritized Capabilities Solution Determination Alternatives Feasibility Assessments & Management Risks Economic Analysis/TCO/ROI) Tradeoff Road Map 14
  • 16. Past Performance = Assured Outcomes Where AAM and IT-AAC have proven: better, faster, cheaper Navy: Assessment of AFLOAT Program – CANES SOA & Security Strategy Contact Value: $350k Eliminated hi-risk Requirements by 23%, $100Ms in potential savings USAF: Streamlined COTS Acquisition Process. Applied to Server Virtualization. Contract Value: $500k Established optimal arch with ROI of 450% & $458 million savings AFISRA: Applied AAM to conduct ISR Portfolio Risk Assessment (PRA) Contract Value: $500K Guiding reorganization and restructure of ISR Portfolio DISA CAE: DISN GSM-O Recompete Restructured performance metrics, acquisition strategy and SLAs to enable 30% savings on existing DISN Mgt Greatly Exceeded Forecasted Saving in both analysis and acquisition GSA CFO: Financial Mgt System consolidation using AAM. Contract Value: $500k Moved GSA FMS from OMB “red” to “green”. Eliminated duplicative investments that saved $200M BTA DBSAE: Transformed DOD’s Requirements and Agile process, with 2 successful pilots Contract Value: $800k $300 million in potential savings with minimal investment Discovery Channel: Apply AAM to complete AoA and BCA for Enterprise Web Services/Tactical Cloud Contract Value: $330k Provided actionable roadmap for world wide multi-media web services GPO: Developed Acquisition Strategy for Future Digital System FDSys Contract Value: $150k Led to successful acquisition and implementation on time, on budget and 80% cheaper than NARA RMS DHS CIO: Agile Acquisition Roadmap Applying AAM to comply with NDAA/FITARA IT Reform Directives Partnered with DHS FFRDC to shift DHS away from failed weapon systems approach to IT acquisition “we believe that it is necessary to develop a comprehensive set of metrics to give transparency to program execution, avoid subjective judgment, and avoid the wasting of time in both executing commands and in oversight offices. This is consistent with the fundamental recommendations of the Packard Commission and Secretary Robert Gates’s initiative to eliminate inefficiency and waste.” PARCA-RAND Root Cause Analysis of Nunn-McCurdy Breaches
  • 17. Predictable Outcomes from embracing Agile Acquisition How ICH and IT-AAC can reduce barriers to innovation and mitigate risks;  Means of leveraging collective investments and process improvements created by over 22 Intl Standards Bodies, NGOs and Commercial IT communities of practice, (prevents NIH)  Improved CIO/CTO Agility and Effectiveness of IT investments, agile methods and dashboard tools proven to meet challenges of the fast paced IT market (AAM is the only conforming to-date)  Greater access to commercial IT/Cyber innovations, best practices and lessons learned emanating from a$3.9T Global IT market, outside the reach of the Defense Industrial Complex  Access to an infinitely elastic Just-in-Time SMEs and Though Leaders when you need them at a fraction of the cost of butts-in-seats approach typical of this market.
  • 18. 17 Backup Slides in case you are not convinced "“If confirmed, I would review the implementation of Section 804 and make any necessary recommendations for improvement. …If confirmed, I would work to identify the root causes of the Department’s software development problems, identify solutions and implement appropriate corrective action.” Honorable Frank Kendall Senate Confirmation Statement, OSD ATL 2012
  • 19. How IT-AAC Empowers MOSA/BBP/JIE 1.1. Enterprise Architecture. Leverage IT-AAC Benchmarked SOA Best Practices and Architecture Design Patterns. 1.3. Common Standards. IT-AAC’s provides direct access to the worlds leading Standards Partners and Standards of Practice of a $3.8Trillion market. Cost savings alone from IT-AAC investment is over $3.5M/year 3.2. Efficient Business Operations. IT-AAC’s can provide ICH a conduit to body of knowledge and Global 1000 best practices and lessons learned, helping avert common failure patterns and vendor hype. 4.1. Strategic Oversight. The Acquisition Assurance Method (AAM) is a DoD proven, robust Decision Analytics Framework that has been successfully applied across DoD and Civil Agencies, driving measurable outcomes. 4.2. Performance Management. IT-AAC’s Standards Partners have ready to adopt SLAs and Performance Metrics to assure the acquisition lifecycle and mitigate risk. 4.3. Portfolio and Investment Management. agencies can leverage IT-AAC’s public/private partnership to capture benchmarked best practice and lessons learned captured from Telecom, Finance, Aerospace, Logistics and Manufacturing communities 5.0 Enhance trusted partnerships to better leverage innovative. IT-AAC provide significant economies of scale thru reuse around tech assessments, performance metrics, SLAs, and innovation research. IT-AAC’s public/private partnership leverages the combined investments/research of academia, standards bodies, innovators and non-traditional communities of practice “Drive for stable requirements and funding. Use mature technologies, or fund and manage technology development rigorously. Demand domain credentials and experience in both government and industry teams. Insist on transparency. And conduct regular independent reviews.” Al Munson Jr, first director of U.S. national intelligence, acquisition and technology
  • 20. Case Study: Streamlining the DoD’s IT Acquisition for Infrastructure Challenge: Establish OSD BTA’s Agile Acquisition Method for IT Infrastructure (SOA)  Applied ICH’s Acquisition Assurance Method (AAM) standard – Developed IT Business Systems lifecycle entry/exit criteria for great transparency – Established enhanced Clinger Cohen Act process guide for OSD BTA CIO – Developed Value Chain Capability Assessment Methodology (CAM) – Established IT Acquisition Advisory Council to overcome cultural impediments.  Outcomes; IT Acquisition Reform we can believe in – Complemented Business Capability Lifecycle (BCL), providing analytical tools for framing decisions – Enabled actionable Clinger Cohen Act compliance that goes beyond check list – Enabled Component Acquisition Executive with means of judging business value of IT investments – Provided OSD BTA with alternative approach to DoD weapons systems style processes – Used to conduct Pre-milestone B “Hosting” AoA and Business Case Analysis in just 4 months. Projected Savings = $350M over 5 years. Office of the Secretary of Defense, DCIO (2001) ”Since the value of the ICH to our programs increases rapidly through results sharing, we encourage the defense community and IT industry to participate directly in the public service initiative in terms of sponsorship and lessons learned"
  • 21. Challenge: Establish a common and repeatable AF Wide COTS assessment/acquisition process Case Study: Streamlining the IT Acquisition process SAF XC/AQ; AF Solution Assessment Process (ASAP)  Integrated ICH Architecture Assurance Method into all major AF IT components – Developed root cause of analysis of current weaknesses and deficiencies – Identified and integrated both AF and industry best practices into a common framework – Developed series of templates and input/exist criteria for each stage of the SDLC process  Outcomes: Increased traceability from requirements to acquisition, reducing “thrashing” – Provided a common, enterprise wide process designed for leveraging COTS – Augmented architecture process to address legacy and COTS capabilities – Reduce market research and analysis in a fraction of the cost and time by leveraging existing expertise and lessons learned of the market – Provided mechanisms for forcing adoption of 80% solution. “We have put to practice the AF Solution Assessment Process (ASAP) at the Air Force Communications Agency (AFCA) with some well documented success. It was developed with Interoperability Clearinghouse (ICH) and provides a structured and measurable IT assessment process with the agility to provide decision-quality assessments ranging from quick-looks to more in-depth capability-focused technology assessments and lightweight business case analysis.” General Mike Peterson, AF CIO
  • 22. Challenge: Establish a enterprise ship board SOA infrastructure for all shipboard legacy systems Case Study: Validating SOA and Cross Domain Solutions Navy PMW 160 Consolidated Afloat Network Enterprise (CANES)  Establish an actionable solution architecture that leverages SOA & COTS implementation best practices – Provide a standardized Solution Assessment Methodology to leverage best practices and mitigate deployment risk (compliment NESI). – Establishes a Solution Architecture standard and public/private research partnership that maximizes use of commercial trends (COTS/Open Source solutions) via an actionable Open Architecture (OA) – Enable Capability Based Acquisitions. Reveal Gaps in both requirement and industry offerings (define realm of the possible). – Establish SOA performance metrics and SLAs that reflect real world limitations and hold suppliers accountable.  Outcomes of ICH engagement (reduced requirements over specification by 23%); – Proved out as a standardized IT Assessment & Solution Architecture process that will mitigate deployment risk. – AAM assessment products used: Capability Determination and Metrics Service Component Prioritization and Alignment and Feasibility/Risk Assessment – Demonstrated the feasibility and viability of using GOTS/COTS/Open Source products within the CANES Architecture – Demonstrated a method and a plan to: Assess SOA Service Components for CANES Assess migration to Netcentric “need-to-share” systems Produced a large body of artifacts that are important for the architecture phase
  • 23. Challenge: Defense Agile Acquisition Framework & SOA E.H.R. Best Practices Guidance Established Section 804 Agile Acquisition Framework for E.H.R Way Forward – Developed source selection criteria for TMA Program Office – Benchmarked SOA/Cloud Industry Best Practices and Lessons Learned with support from 10 Fortune 100 companies – Built out a proven Agile Framework fully vetted by BTA (Acquisition Assurance Method) Outcomes: Established SOA Roadmap that addressed stake holder needs – Enabled award based on unambiguous design specs – Augmented architecture process to address legacy and COTS SOA/ESB capabilities – Was able to cycle through market research and analysis in a fraction of the cost and time of traditional efforts. – Ensured viability of Solution Architecture in terms of; meeting HIPPA, security, and interoperability requirements Case Study: World Largest Healthcare Agency OSD HA’s Government Wide e-Healthcare program “The ICH repository data and analysis methodologies was very helpful in supporting a quick turn around for [Information Assurance] section of COTS security products. Highly detailed ICH technology domain and product evaluation data comprised over 60% of this urgently needed [architecture] report”. Northrop Grumman on ICH’s support of their successful GCPR Pilot