David Ambrose: So as you know, the administration has identified that the cyber security threat is one of the most serious national security, public safety and economic challenges we face as a nation. We've succeeded in supporting the administration's cross agency priority goal for cyber security. Specifically, we focused on and been able to account for what data and information is entering and exiting our networks, what components are on our networks - the inventory, keeping track of when security status changes, and as important, who's on our systems. So we've implemented DHS's trusted Internet connections and this proves our security posture and incident response capabilities by consolidating our external access points and enhances our monitoring and situational awareness in our own internal security operation centers. In order to be a tech access provider, you have to meet complex architectural requirements and physical security requirements, and we've met that for treasury. We've made significant progress in our situational awareness for continuous monitoring as envisioned by DHS, OMB and NIST. This includes our ability to account for our hardware and software assets, our vulnerabilities that exist, and security configuration baseline changes. The vision of DHS's continuous monitoring program includes being able to answer the question - is the right information getting to the right decision makers in a timely manner? So we've made progress there. Lastly, we've made progress with HSPD-12 initiative to support the PIV subcomponent. We've integrated both the PIV and-- for logical and physical access. And in the shared services department, in 2004, OMB directed the agencies to obtain public key infrastructure services from shared service providers. So, we've been providing that on that, on behalf of Treasury, since 2006. And having the shared PKI environment, drops our operational costs across the government and these savings are realized through a share development environment, shared services, directory services, and shared cryptographic hardware, so our current customer base is significant across the federal PIV environment.
…Read more
Less…