Title: The Role of State IT in Homeland Security
1The Role of State IT in Homeland Security
- Robert L. Womack
- Director, State and Local Government
- Computer Associates International, Inc.
- 13 October 2004
2Outline
- Challenges
- Federal Guidance
- NASCIO Vision a Homeland Security Dashboard
- Concerns implied by the NASCIO Vision
- Enterprise Concerns
- Intelligence Concerns
- Situational Awareness Concerns
- Next Steps
3Todays Challenges
New Challenges seen since 9/11
- Must assume that new attacks are possible and
probable need to build systems to warn,
detect, defend restore - Attacks will be against
- Information Systems
- People and Property
- All critical infrastructures are at risk and
novel attacks are possible - Intelligence and knowledge within each
infrastructure are precious resources need to
leverage this resource - Since 9/11, we have learned that a vast quantity
of data has little or no value in its undigested
form.
4Todays Challenges
- But, great added value comes when the data from
multiple sources is - collected in an organized way from vigilant and
discerning sources in a timely and comprehensive
manner, - analyzed for short-term and long-term as well as
localized and widespread implications, - disseminated to appropriate recipients to
- alert potential targets,
- apprehend potential perpetrators, and
- inform incident managers in order to prevent
attacks, reduce vulnerabilities to attacks, and
expedite recovery from attacks.
This presentation is based on a line of
reasoning first discussed in an as yet
unpublished NASCIO white paper. NASCIO, Using
Information and Communications Technology to
Support the State Homeland Security Mission
draft dated May 7, 2004. While this document has
not yet been formally approved, we believe it
makes a compelling case.
5Todays Challenges
Using secure information and knowledge systems to
protect our nations critical infrastructures
- Systems must leverage human intelligence
- Systems must become intelligent
- Learn from all the data available
- Present information intuitively
- Be brilliant 24 x 7 x 365
- Be secure
Need to turn data into knowledge and action
6Front Line Integrated Threat Analysis Support
Human support
Tailored visualization of operational real-time
and historical information that officers can act
on Defined rules, Intelligence and workflow to
support information processing and knowledge
management Secure, identity- role-based,
access control to indications warnings A
secure, robust network information
infrastructure Crisis management support for
emergencies and disaster recovery
Infrastructure support
7Federal Guidance
- The National Strategy for the Physical Protection
of Critical Infrastructures and Key Assets
states - All U.S. states and territories have established
homeland security liaison offices to manage their
counter-terrorism and infrastructure protection
efforts. - Like the federal government, states should
identify and secure the critical infrastructures
and key assets under their control. - States should promote the coordination of
protective and emergency response activities and
resource support among local jurisdictions and
between regional partners - States should further facilitate coordinated
planning and preparedness by applying unified
criteria for determining criticality,
prioritizing protection investments, and
exercising preparedness within their
jurisdictions. - They should also act as conduits for requests for
federal assistance when the threat at hand
exceeds the capabilities of state and local
jurisdictions and the private entities within
them. - States should also facilitate the exchange of
relevant security information and threat alerts
down to the local level.
8Federal Guidance
- FY 2005 is a start up year for National
Incident Management System NIMS implementation
and full compliance with the NIMS is not required
for you to receive FY 2005 grant funds. Since FY
2005 is a critical year for initial NIMS
adoption, you should start now by prioritizing
your FY 2005 preparedness assistance (in
accordance with the eligibility and allowable
uses of the grant) to facilitate its
implementation. - States, territories, tribes, and local entities
are encouraged to achieve full NIMS
implementation during FY 2005. To the extent that
full implementation is not possible during FY
2005, Federal preparedness assistance must be
leveraged to complete NIMS implementation by FY
2006. By FY 2007, Federal preparedness assistance
will be conditioned by full compliance with the
NIMS. -
- Secretary Tom Ridge
- Department of Homeland Security
- Letter to Governors dated 8 September 2004
9Draft NASCIO Vision
- The Homeland Security Dashboard
- Is the business of the state IT organization
- Is a decision support tool based on current
information and communications technologies - Forms the core of an integrated threat analysis
center for the states homeland security team - Is the primary source for actionable
intelligence - Leverages state IT investments to provide a
common operating picture and situational
awareness to both first responders and first
preventers - Will be encouraged by the National Incident
Management System (NIMS) standards.
10Concerns Implied by the NASCIO Vision
- Enterprise Concerns
- Intelligence Concerns
- Situational Awareness Concerns
11Enterprise Concerns
- Use an existing enterprise advisory or governing
board to assess the current and likely impact of
homeland security information and communications
technology (ICT) on the state enterprise.
Tomorrows silos are being built today. - Use an existing enterprise architecture (EA)
advisory or governing board to assess the impact
of homeland security decision support needs on
the larger state EA program in order to support
needs for flexible, secure, reliable, and
appropriately handled homeland security
information. - Identity management must be at the heart of
homeland security decision support systems. Does
the current identity management strategy provide
the necessary foundation for homeland security
decision support? How must the current strategy
be changed or extended?
12Intelligence Concerns
- Download the Global Intelligence Working Groups
National Criminal Intelligence Sharing Plan at
http//it.ojp.gov/topic.jsp?topic_id93. - Assess the impact of moving sensitive law
enforcement, homeland security, and health care
information across the statewide ICT
infrastructure. - Assess the implications for developing a
statewide intelligence fusion center,
information sharing and analysis program, or
critical infrastructure protection (CIP) office
where analysis of intelligence will be conducted
and warnings/alerts produced. - Be prepared to contribute intelligence regarding
physical and cyber-based threats to state
governments critical information assets as part
of the states larger intelligence-gathering
efforts. Strobes of IT systems supporting first
responders may be a precursor to an attack.
13Situational Awareness Concerns
- Download FEMAs National Incident Management
System (NIMS) plan at http//www.dhs.gov/dhspublic
/display?content3258. Watch for compliance
guidelines to be issued in October 2004. - Assess the impact of requirements for complying
with NIMS. Pay close attention to chapter five
Communication and Information Management and
tab nine Examples of ICS Forms, which will
likely lead XML-based standards development for
inter-jurisdictional document exchange.
14Actionable Intelligence
Get the right information to the right person
at the right time in the right way
Information Sources
Information Knowledge
Information Delivery
Information Gateway
15Next Steps
- Participate in homeland security planning.
- Consider IT security as you deploy new
applications. - Remember that alerts from your IT security
system(s) are valuable inputs to your states
integrated threat analysis center. - Assist your CISO community in making cyber
security a part of your state/agencys homeland
security plan. - If you support First Responders, begin NIMS
planning this year.
16Questions?
17References
18First Responder Grant Budget Trends
Source INPUT, 5 October 2004
19DHS / ODP Permitted Spending for Cyber Security
- Intrusion Detection
- Configuration Management and Patch Distribution
- Scanning and Detection Tools
- Geographic Information Systems
- Network Systems Management (NSM) and Analysis
- Encryption Systems
- Firewall and Authentication
- Security Hardware and Software for Counter
measures
20Security Control Center
Real Time Or Time Lapse
Data On Demand
Integrated Security View
Physical Security View
Cyber-security View
Entering Cyberspace
Compile, Display Analyze Security Events from
Disparate Sources -- Fully Customizable for
Group or Individual Needs
21Physical Security View
22CA Fast Facts
- Founded in 1976
- Headquartered in Islandia, New York
- Fiscal Year 2004 revenues of 3.28 billion
- More than15,000 employees in more than 40
countries - Committed to the highest corporate governance
standards - Executive Team
- Lewis Ranieri, Chairman
- Kenneth Cron, Interim Chief Executive Officer
- Jeff Clarke, Chief Operating Officer and Chief
Financial Officer - Kenneth Handal, Executive Vice President and
General Counsel - Mark Barrenechea, Executive Vice President of
Product Development - Greg Corgan, Executive Vice President of
Worldwide Sales - Yogesh Gupta, Chief Technology Officer
23CA Leadership Credentials
- Shaping the industry through innovation
- Pioneered enterprise systems management software
- Awarded 280 patents for advanced technology
solutions - Active in every major standards organization
- First to earn the International Organization for
Standardizations (ISO) 90021994 Global
Certification and 90012000, the new, ultimate
ISO certification - Only company to use one system to manage quality
throughout its worldwide operations - Worlds leading businesses partner with us
- 95 percent of the Fortune 500 as well as
thousands of other companies worldwide use our
software - Partnerships drive success
- Developed significant relationships with
customers, industry peers and community
organizations - Organized channel operations to make it easier
for customers of all sizes to purchase and use CA
solutions
24Contacts
- Contacts for more information
- Erin Sullivan
- VP, State and Local Government 908-531-0128
- Rod Hovater
- Account Director State and Local 770-953-3640
- Bob Womack
- Business Development Director HLS 617-733-5741
25The Role of State IT in Homeland Security
- Robert L. Womack
- Director, State and Local Government
- Computer Associates International, Inc.
- 13 October 2004