don cybersecurity information assurance workforce
play

DON Cybersecurity/Information Assurance Workforce Management Chris - PowerPoint PPT Presentation

DON Cybersecurity/Information Assurance Workforce Management Chris Kelsall DON CIO, Director, Cyber/IT Workforce 23 March 2010 Steps to Transform IAWF Management Charter DON team to determine best approach Establish governance due to


  1. DON Cybersecurity/Information Assurance Workforce Management Chris Kelsall DON CIO, Director, Cyber/IT Workforce 23 March 2010

  2. Steps to Transform IAWF Management • Charter DON team to determine best approach • Establish governance due to complexity - Cybersecurity/IAWF • Establish common lexicon • Write policy – Establish DON standards and consistency – Define Metrics – Develop Compliance reporting and feedback loop • Develop Communications Plan ( conferences, articles, memos) • Promulgate Implementation Plan • Provide annual direction from DON CIO • Provide direction from Service operational/tactical leadership • Share best practices and “lessons learned” • Reinforce enterprise requirements 2

  3. Defining the Enterprise IAWF IA Professional Basic User • Civilian Additional/ • Contractor Embedded Duty • Officer & Enlisted • Active & Reserve Full Time • Ashore & Afloat IA Workforce Transition to:  Standardized DON workforce  Full Time Professionals  Blended Training Solution  NIST/CNSS Standards  Certified  Electronically Managed 3

  4. UNCLASSIFIED 2005-2008 IA Workforce Working Group Construct Membership: (Reduce Redundant Efforts/Leverage Best Practices) Manpower and Personnel TYCOMS Simultaneous Development and Integration Operations Functionals - IA Data Call Technical Experts - IA Competency Management Human Resources Enterprise-wide Common Approach - IA Workforce Management Policy OPR: DON CIO OCR: HQMC/OPNAV N61/NNWC Training and Certification Membership: Training Representatives - Training Path Standard Technical Experts - Certification Process TYCOMS Fleet/Operating Forces - Implementation Plans - XML/SCORM e-learning Schema OPR: MPT&E/TECOM OCR: HQMC/CNO N61/NNWC Membership: Workforce Management e-Solution Manpower, Personnel, -Requirements Document Training, Human -DoD Visibility (DMDC, DCPDS, CVS) Resources -Funding OPR: MPT&E/TECOM OCR: HQMC/CNO N61/NNWC -User Friendly paperless test processes CND SP Committee Membership: Communities of Interest IASAE Committee 4 UNCLASSIFIED

  5. Meeting Operational Requirements 1 Identify Monitor and Identify Position Assess Person Performance In Billet IAWF Determine KSAs Identify Training Improvement meet operational Fleet & Certification requirement – Readiness Level Exercise to improve & Improved Warfighting Capability Conduct Training Conduct Skills and Certification Gap Analysis Exam Identify level of performance of position 5

  6. The Long Journey 2010/2011 DMDC DWCA/ Cybersecurity/IA CVS EXECUTE Workforce Capabilities T WMS/ MCT I MS Key 2009 DCPDS Up g ra d e Decisions 100% c e rtifie d REFINE 2007/8 70% c e rtifie d Co mp o ne nts DBs Ca p ture I AWF EXAMINE/ASSESS 40% c e rtifie d Workforce Design 2006 Examine/Assess full IA (military, civilian, Asse ss I A a t contractor) Workforce Do D Sc ho o l ANALYZE Cmd s capabilities and requirements 10% certified 2005 I A Po sitio ns I d e ntifie d & Bud g e te d DESCRIBE

  7. The Future • New Certifications – Cyber Attack/Exploit – Law Enforcement – Counterintelligence • Currency – Continuing Education – Exercises/Simulations – Rapid Education and Training Deployment • Educators and Trainers – Qualified and Current – Established Career Path – Community Information Sharing 7

  8. Cybersecurity World Cybersecurity/ IAWF nnect our o the men tip of the they are oyer or Cybersecurity/ orward in Iraq. IAWF must bring nse of t we do. ” 8 8 N CIO

  9. Questions Chris Kelsall DON CIO, Director, Cyber/IT Workforce chris.t.kelsall@navy.mil www.doncio.navy.mil 23 March 2010

  10. Oversight and Compliance IAWF MOCC (Chartered 16 March 2009) • MOCC Executive Committee (DON CIO, DDCIO Navy and Marine Corps Designees) will: – Report to the DON Information Executive Committee (IEC) – Continue to make recommendations to OSD DIAP regarding the IA WIP – Provide DON Requirements to the Commercial Vendors – Communicate compliance requirements – Make IA WIP command assist visits – Monitor command commercial certification status to ensure compliance – Support Cybersecurity (IA) workforce roles development 10

  11. Direction – Commands are required to: identify IA billets and people; train and certify; and electronically track Federal Information Security Management Act  DODD 8570.01 Information Assurance Training, Certification, and Workforce  Management DOD 8570.01- M Information Assurance Workforce Improvement Program  SECNAVINST M-5239.3B DON Information Assurance Program  SECNAVMAN 5239.2 IAWF Management Manual to Support IA WIP  Management Oversight and Compliance Council (IAWF MOCC) Charter of 16  March 2009. DON CIO 021504Z FEB 10 MSG, Subj: Cybersecurity/IA Workforce  Improvement Program Implementation Status/CY 2010 Action Plan SECNAVINST 5239.x: IA Workforce Management Oversight and Compliance  (draft - in flag level chop)

  12. Ongoing initiatives which will affect our Future Cybersecurity/IA Workforce Construct • Comprehensive National Cybersecurity Initiative (CNCI) to secure government networks, protect against constant intrusion attempts, and anticipate future threats. • DoD and DON Cyber/IM/IT) Strategic Plans for achieving information advantage. • National Military Strategy for Cyberspace Operations (NMS-CO), Network Operations (NetOps) construct for operating and defending the Global Information Grid (GIG). Under United States Strategic Command (USSTRATCOM), - NetOps with other cyber operations - a Sub-unified US Cyber Command with subordinate FLTCYBERCOM and MARCYBERCOM structure. • IA Component of the GIG integrated Architecture Stay Tuned! and strategies and programs for delivering key identity and IA capabilities as enterprise services. 12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend