Title: Carl Unholz
1Changing IT Environment
- Carl Unholz
- 78 CG/CL
- 7 Feb 08
2Incidents on AF Nets
- December 1998 January 2003
- Most activity from moderately skilled individuals
- Hackers, Script kiddies, Criminals
14,555,070,171 Suspicious Connections
3,824,527 Real-Time Alerts
37,329 Suspicious Events
7,279 Threats
- 30 validated incidents
- 23 had TCNOs
- Patches/Updates not done
- Poor permission settings
- Default or weak passwords
Validate
9 Root 15 User-Level 6 Malware
February 2003 Present Skilled / organized
actors (possibly state-sponsored)
- Physical destruction
- Forces of Nature
- Nation States
- Non-State Actors
Recent exploits have reduced operational
capabilities on our networks. Failure to
secure our networks will weaken our warfighting
ability and potentially put lives at
risk. DEPSECDEF Aug 04
3Organized Threat
- More than 30 countries said developing
cyberwarfare capabilities - Becoming battlefield of choice due to
comparatively lower cost - Can conduct attacks against critical
infrastructures, economy, or national security
while disguising origin of attack - Been reported terrorist organizations have gt5K
websites so members dont have to possess
incriminating infoUS intel systems collect a TB
daily or 1/16 the contents of the Library of
Congress - Chinas PLA allegedly hacked into a Pentagon
network serving office of Defense Secretary Gates
resulting in a weeklong shutdown - Chinese hackers suspected of a campaign of
systematically accessing systems and simply
downloading everything possible - Enemies and allies alike have been able to obtain
crucial weapon system data and cut RD times by
over a decade in some instanceseating away at
the heart of USs advantage
The enemy is an unsecure cyberspace
4(No Transcript)
5AF Mission Statement
The mission of the United States Air Force is to
deliver sovereign options for the defense of the
United States of America and its global interests
-- to fly and fight in Air, Space, and
Cyberspace. SECAF CSAF 7 Dec 05
6The Operational Impact of IT
- AF IT efforts paying off
- Compressed kill chain
- One time of flight strike
- In-depth battlespace understanding
FIND
ASSESS
FIX
ENGAGE
TRACK
TARGET
Hours
Kill Chain Timeline
Minutes
2006 AL ZARQAWI
1991 SCUD LAUNCHER
1999 S/A-6 MISSILE SITE
2003 SADDAM HUSSEIN
7Pressures and Our Response
- Security
- AFNETOPS/AFCYBER
- Clinger-Cohen Act (CCA)
- National Defense Authorization Act (NDAA)
- Expeditionary Combat Support System (ECSS)
- Budget
- PBD 720
- Regionalization of Functionals
Consolidation, Governance
Customer-focused, 5-Yr Strat Planning
Embrace it!
PM training, Sharepoint
Applications reduction
Lean, Portfolio Management
78th Communications Group
Apps standardization, GIG??
8Pressures and Our Response
- Security Consolidation, Governance
- AFNETOPS/AFCYBER Customer-focused, 5-Yr Strat
Planning - Clinger-Cohen Act (CCA) Embrace it!
- National Defense Authorization Act (NDAA) PM
training, Sharepoint - Expeditionary Combat Support System (ECSS)
Applications reduction - Budget Lean, Portfolio Management
- PBD 720 78th Communications Group
- Regionalization of Functionals Apps
standardization, GIG??
9Result
- An extremely agile, business-minded, and
customer-oriented organization continually
looking forward and seeking strategic solutions.
1078 CG Progression
Knowledge Management
11 78th Communications Group
12Value Stream Map
- Trouble tickets
- Requirements
- CRs
- Liaisons
- ITIL
- Validation
- BCA
- Prioritization
13What Does Future Look Like?
- Infrastructure will regionalize/become utility of
sorts - Green IT
- Data Management/Clean-Up
- Customer Advocate
- User Training/Certification
- Collaboration
- Technology Insertion
- AFMC lead for RFIDinstalling at 7 bases
currently - Regional Opportunities/Export Services
- AF lead for RAMPODin use at 70 bases
- Portfolio Managementwheres the next best Return
on Investment?
14HVMLogical Technology Candidate
Apps
Data
ECSS
202s
Single Sign-on
Tablets
RFID
GPS
QA
Wireless
UID
Safety
Headsets
Collaboration
Work Cards
NDI
Supply Lockers
Predictive Analysis
TAA
TOs
15Summary
- Threats and Changes Abound!
- Staying One Step Ahead to Date
- Role will continue to evolve
- Potential Industry partners will require
compelling business case!
16Questions?