The Role of State IT in Homeland Security - PowerPoint PPT Presentation

About This Presentation
Title:

The Role of State IT in Homeland Security

Description:

All trademarks, trade names, services marks and logos ... NASCIO Vision a Homeland Security Dashboard. Concerns implied by ... apprehend potential ... – PowerPoint PPT presentation

Number of Views:64
Avg rating:3.0/5.0
Slides: 26
Provided by: robertl79
Category:

less

Transcript and Presenter's Notes

Title: The Role of State IT in Homeland Security


1
The Role of State IT in Homeland Security
  • Robert L. Womack
  • Director, State and Local Government
  • Computer Associates International, Inc.
  • 13 October 2004

2
Outline
  • Challenges
  • Federal Guidance
  • NASCIO Vision a Homeland Security Dashboard
  • Concerns implied by the NASCIO Vision
  • Enterprise Concerns
  • Intelligence Concerns
  • Situational Awareness Concerns
  • Next Steps

3
Todays Challenges
New Challenges seen since 9/11
  • Must assume that new attacks are possible and
    probable need to build systems to warn,
    detect, defend restore
  • Attacks will be against
  • Information Systems
  • People and Property
  • All critical infrastructures are at risk and
    novel attacks are possible
  • Intelligence and knowledge within each
    infrastructure are precious resources need to
    leverage this resource
  • Since 9/11, we have learned that a vast quantity
    of data has little or no value in its undigested
    form.

4
Todays Challenges
  • But, great added value comes when the data from
    multiple sources is
  • collected in an organized way from vigilant and
    discerning sources in a timely and comprehensive
    manner,
  • analyzed for short-term and long-term as well as
    localized and widespread implications,
  • disseminated to appropriate recipients to
  • alert potential targets,
  • apprehend potential perpetrators, and
  • inform incident managers in order to prevent
    attacks, reduce vulnerabilities to attacks, and
    expedite recovery from attacks.

This presentation is based on a line of
reasoning first discussed in an as yet
unpublished NASCIO white paper. NASCIO, Using
Information and Communications Technology to
Support the State Homeland Security Mission
draft dated May 7, 2004. While this document has
not yet been formally approved, we believe it
makes a compelling case.
5
Todays Challenges
Using secure information and knowledge systems to
protect our nations critical infrastructures
  • Systems must leverage human intelligence
  • Systems must become intelligent
  • Learn from all the data available
  • Present information intuitively
  • Be brilliant 24 x 7 x 365
  • Be secure

Need to turn data into knowledge and action
6
Front Line Integrated Threat Analysis Support
Human support
Tailored visualization of operational real-time
and historical information that officers can act
on Defined rules, Intelligence and workflow to
support information processing and knowledge
management Secure, identity- role-based,
access control to indications warnings A
secure, robust network information
infrastructure Crisis management support for
emergencies and disaster recovery
Infrastructure support
7
Federal Guidance
  • The National Strategy for the Physical Protection
    of Critical Infrastructures and Key Assets
    states
  • All U.S. states and territories have established
    homeland security liaison offices to manage their
    counter-terrorism and infrastructure protection
    efforts.
  • Like the federal government, states should
    identify and secure the critical infrastructures
    and key assets under their control.
  • States should promote the coordination of
    protective and emergency response activities and
    resource support among local jurisdictions and
    between regional partners
  • States should further facilitate coordinated
    planning and preparedness by applying unified
    criteria for determining criticality,
    prioritizing protection investments, and
    exercising preparedness within their
    jurisdictions.
  • They should also act as conduits for requests for
    federal assistance when the threat at hand
    exceeds the capabilities of state and local
    jurisdictions and the private entities within
    them.
  • States should also facilitate the exchange of
    relevant security information and threat alerts
    down to the local level.

8
Federal Guidance
  • FY 2005 is a start up year for National
    Incident Management System NIMS implementation
    and full compliance with the NIMS is not required
    for you to receive FY 2005 grant funds. Since FY
    2005 is a critical year for initial NIMS
    adoption, you should start now by prioritizing
    your FY 2005 preparedness assistance (in
    accordance with the eligibility and allowable
    uses of the grant) to facilitate its
    implementation.
  • States, territories, tribes, and local entities
    are encouraged to achieve full NIMS
    implementation during FY 2005. To the extent that
    full implementation is not possible during FY
    2005, Federal preparedness assistance must be
    leveraged to complete NIMS implementation by FY
    2006. By FY 2007, Federal preparedness assistance
    will be conditioned by full compliance with the
    NIMS.
  • Secretary Tom Ridge
  • Department of Homeland Security
  • Letter to Governors dated 8 September 2004

9
Draft NASCIO Vision
  • The Homeland Security Dashboard
  • Is the business of the state IT organization
  • Is a decision support tool based on current
    information and communications technologies
  • Forms the core of an integrated threat analysis
    center for the states homeland security team
  • Is the primary source for actionable
    intelligence
  • Leverages state IT investments to provide a
    common operating picture and situational
    awareness to both first responders and first
    preventers
  • Will be encouraged by the National Incident
    Management System (NIMS) standards.

10
Concerns Implied by the NASCIO Vision
  • Enterprise Concerns
  • Intelligence Concerns
  • Situational Awareness Concerns

11
Enterprise Concerns
  • Use an existing enterprise advisory or governing
    board to assess the current and likely impact of
    homeland security information and communications
    technology (ICT) on the state enterprise.
    Tomorrows silos are being built today.
  • Use an existing enterprise architecture (EA)
    advisory or governing board to assess the impact
    of homeland security decision support needs on
    the larger state EA program in order to support
    needs for flexible, secure, reliable, and
    appropriately handled homeland security
    information.
  • Identity management must be at the heart of
    homeland security decision support systems. Does
    the current identity management strategy provide
    the necessary foundation for homeland security
    decision support? How must the current strategy
    be changed or extended?

12
Intelligence Concerns
  • Download the Global Intelligence Working Groups
    National Criminal Intelligence Sharing Plan at
    http//it.ojp.gov/topic.jsp?topic_id93.
  • Assess the impact of moving sensitive law
    enforcement, homeland security, and health care
    information across the statewide ICT
    infrastructure.
  • Assess the implications for developing a
    statewide intelligence fusion center,
    information sharing and analysis program, or
    critical infrastructure protection (CIP) office
    where analysis of intelligence will be conducted
    and warnings/alerts produced.
  • Be prepared to contribute intelligence regarding
    physical and cyber-based threats to state
    governments critical information assets as part
    of the states larger intelligence-gathering
    efforts. Strobes of IT systems supporting first
    responders may be a precursor to an attack.

13
Situational Awareness Concerns
  • Download FEMAs National Incident Management
    System (NIMS) plan at http//www.dhs.gov/dhspublic
    /display?content3258. Watch for compliance
    guidelines to be issued in October 2004.
  • Assess the impact of requirements for complying
    with NIMS. Pay close attention to chapter five
    Communication and Information Management and
    tab nine Examples of ICS Forms, which will
    likely lead XML-based standards development for
    inter-jurisdictional document exchange.

14
Actionable Intelligence
Get the right information to the right person
at the right time in the right way
Information Sources
Information Knowledge
Information Delivery
Information Gateway
15
Next Steps
  • Participate in homeland security planning.
  • Consider IT security as you deploy new
    applications.
  • Remember that alerts from your IT security
    system(s) are valuable inputs to your states
    integrated threat analysis center.
  • Assist your CISO community in making cyber
    security a part of your state/agencys homeland
    security plan.
  • If you support First Responders, begin NIMS
    planning this year.

16
Questions?
17
References
18
First Responder Grant Budget Trends
Source INPUT, 5 October 2004
19
DHS / ODP Permitted Spending for Cyber Security
  • Intrusion Detection
  • Configuration Management and Patch Distribution
  • Scanning and Detection Tools
  • Geographic Information Systems
  • Network Systems Management (NSM) and Analysis
  • Encryption Systems
  • Firewall and Authentication
  • Security Hardware and Software for Counter
    measures

20
Security Control Center
Real Time Or Time Lapse
Data On Demand
Integrated Security View
Physical Security View
Cyber-security View
Entering Cyberspace
Compile, Display Analyze Security Events from
Disparate Sources -- Fully Customizable for
Group or Individual Needs
21
Physical Security View
22
CA Fast Facts
  • Founded in 1976
  • Headquartered in Islandia, New York
  • Fiscal Year 2004 revenues of 3.28 billion
  • More than15,000 employees in more than 40
    countries
  • Committed to the highest corporate governance
    standards
  • Executive Team
  • Lewis Ranieri, Chairman
  • Kenneth Cron, Interim Chief Executive Officer
  • Jeff Clarke, Chief Operating Officer and Chief
    Financial Officer
  • Kenneth Handal, Executive Vice President and
    General Counsel
  • Mark Barrenechea, Executive Vice President of
    Product Development
  • Greg Corgan, Executive Vice President of
    Worldwide Sales
  • Yogesh Gupta, Chief Technology Officer

23
CA Leadership Credentials
  • Shaping the industry through innovation
  • Pioneered enterprise systems management software
  • Awarded 280 patents for advanced technology
    solutions
  • Active in every major standards organization
  • First to earn the International Organization for
    Standardizations (ISO) 90021994 Global
    Certification and 90012000, the new, ultimate
    ISO certification
  • Only company to use one system to manage quality
    throughout its worldwide operations
  • Worlds leading businesses partner with us
  • 95 percent of the Fortune 500 as well as
    thousands of other companies worldwide use our
    software
  • Partnerships drive success
  • Developed significant relationships with
    customers, industry peers and community
    organizations
  • Organized channel operations to make it easier
    for customers of all sizes to purchase and use CA
    solutions

24
Contacts
  • Contacts for more information
  • Erin Sullivan
  • VP, State and Local Government 908-531-0128
  • Rod Hovater
  • Account Director State and Local 770-953-3640
  • Bob Womack
  • Business Development Director HLS 617-733-5741

25
The Role of State IT in Homeland Security
  • Robert L. Womack
  • Director, State and Local Government
  • Computer Associates International, Inc.
  • 13 October 2004
Write a Comment
User Comments (0)
About PowerShow.com