Carl Unholz - PowerPoint PPT Presentation

1 / 15
About This Presentation
Title:

Carl Unholz

Description:

Most activity from moderately skilled individuals. Hackers, ... Consoli-dation. High 5. Cost Reduction. CCA. Normal-ization. AF-Led. Change. Knowledge Management ... – PowerPoint PPT presentation

Number of Views:106
Avg rating:3.0/5.0
Slides: 16
Provided by: Eric168
Category:
Tags: carl | dation | unholz

less

Transcript and Presenter's Notes

Title: Carl Unholz


1
Changing IT Environment
  • Carl Unholz
  • 78 CG/CL
  • 7 Feb 08

2
Incidents on AF Nets
  • December 1998 January 2003
  • Most activity from moderately skilled individuals
  • Hackers, Script kiddies, Criminals

14,555,070,171 Suspicious Connections
3,824,527 Real-Time Alerts
37,329 Suspicious Events
7,279 Threats
  • 30 validated incidents
  • 23 had TCNOs
  • Patches/Updates not done
  • Poor permission settings
  • Default or weak passwords

Validate
9 Root 15 User-Level 6 Malware
February 2003 Present Skilled / organized
actors (possibly state-sponsored)
  • Physical destruction
  • Forces of Nature
  • Nation States
  • Non-State Actors

Recent exploits have reduced operational
capabilities on our networks. Failure to
secure our networks will weaken our warfighting
ability and potentially put lives at
risk. DEPSECDEF Aug 04
3
Organized Threat
  • More than 30 countries said developing
    cyberwarfare capabilities
  • Becoming battlefield of choice due to
    comparatively lower cost
  • Can conduct attacks against critical
    infrastructures, economy, or national security
    while disguising origin of attack
  • Been reported terrorist organizations have gt5K
    websites so members dont have to possess
    incriminating infoUS intel systems collect a TB
    daily or 1/16 the contents of the Library of
    Congress
  • Chinas PLA allegedly hacked into a Pentagon
    network serving office of Defense Secretary Gates
    resulting in a weeklong shutdown
  • Chinese hackers suspected of a campaign of
    systematically accessing systems and simply
    downloading everything possible
  • Enemies and allies alike have been able to obtain
    crucial weapon system data and cut RD times by
    over a decade in some instanceseating away at
    the heart of USs advantage

The enemy is an unsecure cyberspace
4
(No Transcript)
5
AF Mission Statement
The mission of the United States Air Force is to
deliver sovereign options for the defense of the
United States of America and its global interests
-- to fly and fight in Air, Space, and
Cyberspace. SECAF CSAF 7 Dec 05
6
The Operational Impact of IT
  • AF IT efforts paying off
  • Compressed kill chain
  • One time of flight strike
  • In-depth battlespace understanding

FIND
ASSESS
FIX
ENGAGE
TRACK
TARGET
Hours
Kill Chain Timeline
Minutes
2006 AL ZARQAWI
1991 SCUD LAUNCHER
1999 S/A-6 MISSILE SITE
2003 SADDAM HUSSEIN
7
Pressures and Our Response
  • Security
  • AFNETOPS/AFCYBER
  • Clinger-Cohen Act (CCA)
  • National Defense Authorization Act (NDAA)
  • Expeditionary Combat Support System (ECSS)
  • Budget
  • PBD 720
  • Regionalization of Functionals

Consolidation, Governance
Customer-focused, 5-Yr Strat Planning
Embrace it!
PM training, Sharepoint
Applications reduction
Lean, Portfolio Management
78th Communications Group
Apps standardization, GIG??
8
Pressures and Our Response
  • Security Consolidation, Governance
  • AFNETOPS/AFCYBER Customer-focused, 5-Yr Strat
    Planning
  • Clinger-Cohen Act (CCA) Embrace it!
  • National Defense Authorization Act (NDAA) PM
    training, Sharepoint
  • Expeditionary Combat Support System (ECSS)
    Applications reduction
  • Budget Lean, Portfolio Management
  • PBD 720 78th Communications Group
  • Regionalization of Functionals Apps
    standardization, GIG??

9
Result
  • An extremely agile, business-minded, and
    customer-oriented organization continually
    looking forward and seeking strategic solutions.

10
78 CG Progression
  • ORI

Knowledge Management
  • Shield the Enterprise!

11
78th Communications Group
  • Center
  • Deputy CIO Duties

12
Value Stream Map
  • Apps
  • Demand
  • Mgmt
  • PfM
  • PPM
  • Resources
  • Mgmt
  • Trouble tickets
  • Requirements
  • CRs
  • Liaisons
  • ITIL
  • Validation
  • BCA
  • Prioritization
  • Ops

13
What Does Future Look Like?
  • Infrastructure will regionalize/become utility of
    sorts
  • Green IT
  • Data Management/Clean-Up
  • Customer Advocate
  • User Training/Certification
  • Collaboration
  • Technology Insertion
  • AFMC lead for RFIDinstalling at 7 bases
    currently
  • Regional Opportunities/Export Services
  • AF lead for RAMPODin use at 70 bases
  • Portfolio Managementwheres the next best Return
    on Investment?

14
HVMLogical Technology Candidate
Apps
Data
ECSS
202s
Single Sign-on
Tablets
RFID
GPS
QA
Wireless
UID
Safety
Headsets
Collaboration
Work Cards
NDI
Supply Lockers
Predictive Analysis
TAA
TOs
15
Summary
  • Threats and Changes Abound!
  • Staying One Step Ahead to Date
  • Role will continue to evolve
  • Potential Industry partners will require
    compelling business case!

16
Questions?
Write a Comment
User Comments (0)
About PowerShow.com