Bonnie M' Hammersley - PowerPoint PPT Presentation

1 / 31
About This Presentation
Title:

Bonnie M' Hammersley

Description:

Comprehensive National Cyber Security Initiative (CNCI) Lead by Sec Homeland Security ... Bush budget done normal time First Monday in February submit. Obama budget ... – PowerPoint PPT presentation

Number of Views:208
Avg rating:3.0/5.0
Slides: 32
Provided by: bonnieha3
Category:

less

Transcript and Presenter's Notes

Title: Bonnie M' Hammersley


1

OASD(NII)/DoD CIO and the INFORMATION TECHNOLOGY
BUDGET
  • Bonnie M. Hammersley
  • DASD (Resources)
  • OASD(Networks Information Integration)/DoD
    Chief Information Officer (CIO)

2
What will be covered ...
  • Who We Are
  • What We Do
  • IT Budget
  • The Big Picture

3
(No Transcript)
4
ASD(NII)/DoD CIO Responsibilities
  • Networks and Net-Centric Policies and Concepts
  • Enterprise-wide integration of DoD information
    matters

Principal Staff Assistant
Chief Information Officer
US Title 40 Manage Information Resources
US Title 10 Advise the Secretary
  • Enterprise-level strategist from the information
    perspective
  • Enterprise-wide Information policy
  • Information architect for the DoD Enterprise
  • DoD-wide information executive
  • Command and Control
  • Communications and Information Networks
  • Information Assurance
  • RF Spectrum Management
  • Position, Navigation, Timing
  • Non-Intelligence Space
  • Authorities
  • NII Charter (DoDD 5144.1 May 2, 2005)
  • Section 113, Title 40, U.S.C., (formerly
    Clinger-Cohen Act of 1996 as amended)
  • Responsibilities and Control Matrix

5
Organization Chart
6
DASD (Resources) ...
  • DoD CIO provides resource oversight and guidance
    for IT Budget Reporting.
  • DoD CIO compiles, reviews and submits the DoD
    Information Technology Budget to OMB and
    Congress.
  • Jan 98 memo transferred responsibility from
    OUSD(C) to ASD(C3I) (now OASD(NII/DoD CIO)).
  • DoD CIO uses the OSD(PAE) Select and Native
    Programming Application - Information Technology
    (SNaP-IT) to collect data from the
    MILDEPs/Agencies.

7
  • And ...
  • ARE WE SPENDING THE TAXPAYERS MONEY WISELY?

8
DoD IT Budget (FY09 PB)
Army 7.8 24
Army 7.7 24
Defense Wide 10.3 32
Defense Wide 11.3 34
Air Force 6.9 22
Air Force 7.0 21
Navy 7.1 22
Navy 7.0 21
FY2008 32.1
FY2009 33.0
(dollars in billions)
9
By the Way ...
  • IT Budget is a misnomer
  • not a budget like in household budgeting
  • e.g. set aside X dollars for utilities
  • is a SUBSET of the DoD Budget
  • define subset entitled IT
  • e.g. define utilities to be electric, gas,
    telephone landline and water
  • count subset
  • e.g. count dollars for electric, gas, telephone
    landline and water

10
Why is reporting not a DoD Comptroller Function?
  • Jan 98 memo Review and compilation of the DoD
    Information Technology Budget transferred
    responsibility from OUSD(C) to ASD(C3I)

11
So whats IT?
  • Any equipment or interconnected system or
    subsystem of equipment, that is used in the
    automatic acquisition, storage, manipulation,
    management, movement, control, display,
    switching, interchange, transmission, or
    reception of data or information by the executive
    agency. The term "information technology"
    includes computers, ancillary equipment,
    software, firmware and similar procedures,
    services (including support services), and
    related resources.

Clinger-Cohen Act of 1996
12
Whats Reported?
  • "All resources will be reported within
    initiatives. Initiatives can be systems,
    programs, projects, organizations, activities or
    family of systems.
  • FMR Vol 2B, Chapter 18 (180103)
  • Defense business systems must be included within
    the IT Budget at the system level, not as system
    of systems, family of systems, or bundle of
    systems (i.e., Defense Business System
    Initiative).
  • FMR Vol 2B, Chapter 18 (180103(G))

13
IT REPORTING REQUIREMENTS
  • OMB
  • Circular A-11, Exhibits 53 and 300
  • Congressional
  • FY03 DoD Appropriation House Report 4546, Title
    III, Section 351
  • FY05 National Defense Authorization Act, "Defense
    Business Enterprise Architecture, System
    Accountability, and Conditions for Obligation of
    Funds for Defense Business System Modernization,"
    Sec 332 2222 (h) Budget Information

14
OFFICE OF MANAGEMENT BUDGET
  • OMB Circular A-11, Preparation, Submission and
    Execution of the Budget
  • http//www.whitehouse.gov/omb/circulars/a11/curren
    t_year/a11_toc.html
  • Provides guidance to entire Federal government
  • IT budget addressed in two sections
  • Section 53, Information Technology and
    eGovernment Describes the Exhibit 53
  • Section 300, Planning, Budgeting, Acquisition and
    Management of Capital Assets Describes the
    Exhibit 300

15
EXHIBIT 53 EXHIBIT 300
  • Exhibit 53
  • Completed for both BES PB cycle
  • Includes all IT initiatives
  • Submitted Electronically to OMB
  • Exhibit 300
  • Initially completed for the BES PB submission
    only for initiatives on OMB Management Watch List
  • Only Initiatives designated Major required to
    submit
  • List negotiated each year
  • Must be Scored prior to submission to OMB
  • Submitted Electronically to OMB

16
CONGRESS Sec 351
  • Requires Investments gt 30M, information similar
    to EX 300/Capital Investment Report (CIR),
    includes identification of
  • Prime contractors associated with the initiative,
    and description of the worked to be performed
  • Compliance status with Clinger-Cohen Act (CCA)
  • Compliance status with Government Performance and
    Results Act (GPRA)
  • Resulting document entitled Selected Capital
    Investment Report (SCIR)
  • For Investment gt10M but lt30M, minimal program
    information (Name, Description, Funding request)

17
CONGRESS Sec 332
  • Requires budget information for defense business
    systems
  • Identification of each defense business system
    for which funding is proposed in that budget
  • Identification of all funds, by appropriation,
    proposed in that budget for each such system,
    including
  • funds for current services (to operate and
    maintain the system) and
  • funds for business systems modernization,
    identified for each specific appropriation.
  • For each such system, identification of the
    official to whom authority for such system is
    delegated under subsection (f)
  • For each such system, a description of each
    certification made under subsection (a) with
    regard to such system

18
Comparison Summary
  • OMB
  • A-11, Ex53 300
  • Sept and January
  • BES and PB
  • Electronic submission
  • EX300 Scored
  • Results in OMB guidance
  • Congressional
  • Section 351
  • Section 332
  • March
  • 6-8 wks after PB
  • Paper and electronic submission
  • Results in DoD Appropriations or Authorization
    bills

19
Whats New in FY09
  • Comprehensive National Cyber Security Initiative
    (CNCI)
  • Lead by Sec Homeland Security
  • Protect, defend, and reduce vulnerabilities of
    Federal systems
  • Included funding from three programs
  • National Intelligence Program
  • Military Intelligence Program
  • DoD Non-Intelligence Appropriations
  • Defense Industrial Base (DIB)
  • Protect the supply chain

20
Why FY10 so delayed
  • Change in Administrations both Presidents
    prepare budget
  • Bush budget done normal time First Monday in
    February submit
  • Obama budget
  • Starting point FY09 PB vs. Bush FY10 PB
  • Department Seniors negotiating with OMB on Top
    Line
  • Decisions made at Senior level with little
    involvement from staff
  • First Budget decision received mid-March
  • A battleship doesnt turn on a dime and neither
    does the budget
  • IT Budget anticipated delivery
  • OMB 22 May 09
  • Congress 8 Jun 09

21
Transparency is HERE
  • Visualization to Understand Expenditures in
    Information Technology (VUE-IT)
    http//www.whitehouse.gov/omb/egov/vue-it/index.ht
    mlpath5/path5.jsonpath2/path2.json

22
Transparency is HERE (Cont)
  • Legislative Proposals
  • Reporting on Pre-MAIS and Other IT Investment
    Programs
  • Defense Cyber Crime Center Authority to Admit
    Private Sector Civilians to Cyber Security
    Courses
  • Enterprise Architecture
  • http//www.whitehouse.gov/omb/e-gov/fea/
  • Comprehensive business-driven blueprint of the
    entire Federal government
  • Recovery Act http//www.recovery.gov/

23
Recovery Act Funding
24
Why is IT important to DoD? A. IT is the
fundamental underpinning to achieving
Net-Centricity.
25
Transforming National Defense-- Net-Centric
National Security Strategy Transform Americas
national security institutions to meet the
challenges and opportunities of the twenty-first
century.
National Defense Strategy We will conduct
network-centric operations with compatible
information and communications systems, usable
data, and flexible operational constructs. Beyond
battlefield applications, a network-centric force
can increase efficiency and effectiveness across
defense operations, intelligence functions, and
business processes... Transforming to a
network-centric force requires fundamental
changes in process, policy, and culture.
National Military Strategy ...creation of a
collaborative information environment that
facilitates information sharing, effective
synergistic planning, and execution of
simultaneous, overlapping operations... on
demand to defense policymakers, warfighters and
support personnel.
26
Context for Net-Centric Operations
  • Uncertainty is the defining characteristic of
    todays strategic environment. (National Defense
    Strategy)
  • Challenge UNCERTAINTY
  • Leave behind the reasonable predictability of the
    past
  • Adjust to an era of surprise and uncertainty
  • We have set about making US forces more AGILE
    and more expeditionary. (Quadrennial Defense
    Review)
  • Response AGILITY
  • Enterprise-wide Battlefield Applications
    Defense Operations Intelligence Functions
    Business Processes
  • Capabilities Based Access, Share, Collaborate
  • Fundamental Changes Process, Policy, Culture
  • Emphasis Shift From moving the user to the data
    to moving data to the user

27
Defining Net-Centricity
  • People, processes, and technology working
    together to enable timely
  • ACCESS to information
  • SHARING of information
  • COLLABORATION among those who need it most

Can Only Be Done on The Net!
28
I can get the information I need
When I need it
Where I need it
How I need it
Net-Centric Information Environment
Better Decisions Faster -- Decisive Actions Sooner
29
Our Nations Security
30
Last But Not Least
  • View IT Budgets under Reports at
    https//snap.pae.osd.mil/snapit/loginauth.aspx
  • Email us at oasdnii_rpbo_at_osd.mil
  • Call
  • Craig Garant (703) 695-2653
  • Cynthia Curry (703) 697-4542

31
Questions
Write a Comment
User Comments (0)
About PowerShow.com