Ltc. Paul Stanton: Absolutely. So here goes way beyond cost settings from an army side perspective. It is all about our ability to see the operational domain, the disability that aggregates data from across the enterprise absolutely critical. And what it does, it allows us to empower the work force, but we are able to automate the mundain such that the work force is able to focus on, where the operational and mission priorities are. We are leveraging the data aggregating component, leveraging…
Ltc. Paul Stanton: Again, from the army side perspective, we are focused on operations and mission impact and we are very closely partnered with DISA in pursuing cloud technologies for defence enterprise email. Take, for instance, an individual trouble ticket. In the past that would result in the immediate remediation of whatever that problem was, but now my ability to aggregate the data from across the enterprise and analyze the data from across the enterprise I start to see trends and so now…
Ltc. Paul Stanton: Yes, sir. I appreciate the opportunity. From an army cyber perspective we are leveraging cloud technology to support network operations and in cyber defence specifically leveraging some of the principles associated with cloud computing you [00:00:13] with this access and elastic scalability. We are leveraging cloud technologies to provide operational insights to a much broader population of personnel. Traditionally only the network operators that worked out of the operation…
Ltc Paul Stanton: Yes, sir. It’s a huge concern for us. As we move towards a goal of creating a virtually consolidated data store, we have to consider the threat environment and the fact that we face a very sophisticated and evolving threat on a daily basis.
So first and foremost, we have to control access in. And so we got very tight access controls for who can gain access into the cloud environment. But of equal if not more importance is we’re securing at the data layer.
Ltc Paul Stanton: So building on a concept of sharing with coalition partners, I think that the cloud support sharing fundamentally and I think that we’re going to be able to increase the ability to bring data together from across organizations and fundamentally remove the threats’ ability to hide in the noise. Building also on the point of allowing the analyst to be more interactive with the data—again, that’s going to help reduce the threats’ ability to move…
William Lay: Well Jim, thanks to [00:00:01] leadership. The state’s been at this about 5 years or more now.
JIm Flyzik: Okay.
William Lay: We do have a lot of lessons learned and we’ve grown quite a bit over especially the last 3 years as we mature our program. I think the biggest lesson learned is to ensure that we’re communicating effectively what we’re trying to achieve and do. Once you have a continuous monitoring program in place, people start to make assumptions…
Rod Turk: Oh absolutely. In fact, when I take a look at Department of Commerce, and I think the same is true with most other departments, basic cyber hygiene is really what we need to be looking at—at a very base level. And as you take a look at what’s going on in the department, making sure that we know what our assets are, making sure that we’ve got the proper configuration set on each one of those assets, and then being able to determine patch levels as I mentioned…
Army-Defense Cloud Computing-Benefits-Nov. 2013
Defense Cloud Computing-Challenges-Army-Nov. 2013
Defense Cloud Computing-Progress-Army-Nov. 2013
Health IT-Lessons Learned-DHA-July 2014
Health IT-Lessons Learned-VHA-July 2014
FEF-Health IT-Progress-DHA-July 2014
Air Force-Defense Cloud Computing-Benefits-Nov. 2013
DISA-Defense Cloud Computing-Benefits-Nov. 2013
Secure Cloud Computing-Benefits-NGA-May 2014
Secure Cloud Computing-Profiles-Army-May 2014
MediaSpace™ video portal by Kaltura User Guides and Technical Documentation