BENEFITS OF SUCCESSFUL IT MODERNIZATION

Slides:



Advertisements
Similar presentations
Meets the needs of citizens
Advertisements

Should You Establish a Project Management Office (PMO)?
Overview of Priorities and Activities: Shared Services Canada Presentation to the Information Technology Infrastructure Roundtable June 17, 2013 Liseanne.
ITANA Panel: Using Enterprise Architecture to Drive Business Value Charles F. Leonhardt
Continuous Process Improvement (CPI) Program Update Colonel Ric Sherman, United States Army Office of the Assistant Deputy Under Secretary of Defense for.
BMMP DoD’s Business Management Modernization Overview and Update to ASMC Marilyn Fleming, Deputy Director, Enterprise Architecture Business Modernization.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
CHIEF INFORMATION OFFICER DEPARTMENT OF HEALTH AND HUMAN SERVICES OFFICE OF THE U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES John Teeter Deputy Chief Information.
OHIO OFFICE OF INFORMATION TECHNOLOGY. Even the agents are suffering…
UC San Diego EH&S Staff Meeting Project 2010 Jan00 meeting notes.doc May 5, 2004 Update on the New Business Architecture EH&S Staff Meeting.
IT Planning.
University of California New Business Architecture Project 2010 Jan00 meeting notes.doc April 15, 2004 Accelerating the New Business Architecture UC Employment.
Moving from money well accounted for to money well spent UK Information Technology Summit May 2005 Helen McDonald A/Chief Information Officer Treasury.
Procurement Transformation State of North Carolina
Software Asset Management
Investment Management Concepts Portfolio Management | Segment Architecture March 25, 2009 Adrienne Walker and Kshemendra Paul
Enterprise Architecture
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco CloudVerse for Government: Helping Agencies Reduce Costs and Respond.
European Public Sector Information Systems Conference -- September 30, 1998 Case Study: Building the Skills that Produce Success - A Case Study from the.
Navigating the Maze How to sell to the public sector Adrian Farley Chief Deputy CIO State of California
Enterprise NASA Will Peters August, 2010.
Global IT Planning & Analysis
The Evergreen, Background, Methodology and IT Service Management Model
Transparency, Efficiency & Accountability Why change something that works?  Drivers ◦ Government organization changes ◦ Legislative changes ◦ Compliance.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Engineering, Operations & Technology | Information TechnologyAPEX | 1 Copyright © 2009 Boeing. All rights reserved. Architecture Concept UG D- DOC UG D-
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
DoD Acquisition Domain (Sourcing) (DADS) Analysis of Alternatives (AoA) E-Business/SPS Joint Users’ Conference November 15-19, 2004 Houston, TX.
Why is BCL Needed? BCL addresses long-standing challenges that have impacted the delivery of business capabilities The DepSecDef directed increasing the.
The Challenge of IT-Business Alignment
NASA IT Governance Overview Gary Cox August 18, 2010.
Commonwealth IT Consolidation Background and Basic Talking Points (Update Title as Needed) Committee or Person Presenting Date MM/DD/YYYY.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
December 14, 2011/Office of the NIH CIO Operational Analysis – What Does It Mean To The Project Manager? NIH Project Management Community of Excellence.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
EDUCAUSE 2014 Top Ten IT Issues. Today’s Agenda Introduction to EDUCAUSE IT Issues History & Methodology 2014 Top Ten IT Issues Selected Issues Reviewed.
Unclassified DoD ESI & The Joint Information Environment (JIE) July 20,
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
RBC Supply Chain Solutions. Who we are ? RBC Sourcing provides e-procurement solutions through a unique blend of proven on-demand technologies, affordable.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
EGovOS Panel Discussion CIO Council Architecture & Infrastructure Committee Subcommittee Co-Chairs March 15, 2004.
The DoD Information Enterprise Strategic Plan and Roadmap (SP&R)
Using OMB Section 508 reporting in addressing your agency's program maturity. How to Measure Your Agency's 508 Program.
GSA/OGP Section 508 Program Overview
0 Enabling Strategic Acquisition in DoD Small Business Opportunities in eGov Transformation May 7, 2004 York, PA Mark E. Krzysko Defense Procurement and.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
Quality Milestones Elaborate quality system developed over the years “Joint Agenda Building” (JAB) group “Strategic Quality” – Progress report CA/80/04.
| 1 Weapon System Acquisition Reform- Product Support Assessment DAU SYMPOSIUM 13 April 2010 Presented by: Basil Gray Where Innovation.
Commonwealth IT Consolidation Background and Basic Talking Points Date MM/DD/YYYY.
Info-Tech Research Group1 Manage the IT Portfolio World Class Operations - Impact Workshop.
FITARA Revamping IT in the Federal Government Presentation to DIR Information Security Forum Richard A. Spires April 14, 2016.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
Environment, Safety, and Occupational Health Opportunities in DoD Business Transformation May 4, 2006.
June 23, 2016 Organizational Overview. 2 Automation Federation Background A fragmented community of automation professional associations and societies.
FY17 End of Year Goals Summary FY17: Top 40 Goals Assessment
Attention CFOs How to tighten your belt and still survive May 18, 2017.
IT Governance at the SCO
Improving Mission Effectiveness By Exploiting the Command’s Implementation Of the DoD Enterprise Services Management Framework - DESMF in the [name the.
Identify the Risk of Not Doing BA
Improving Mission Effectiveness By Exploiting the Command’s Implementation Of the DoD Enterprise Services Management Framework - DESMF in the [name the.
By Jeff Burklo, Director
Cloud adoption NECOOST Advisory | June 2017.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
IT Management Services Infrastructure Services
NDIA DoD CIO Vision.
Presentation transcript:

BENEFITS OF SUCCESSFUL IT MODERNIZATION DOD IT MODERNIZATION BENEFITS OF SUCCESSFUL IT MODERNIZATION Save Billions Through Cost Efficiencies Faster Capability Deliveries Strengthen Cyber Security Improve Outcomes of IT Acquisition Improve Interoperability Increase Mission Effectiveness CONSOLIDATE INFRASTRUCTURE 1. Consolidate Enterprise Networks 2. Deliver DoD Enterprise Cloud 3. Standardize IT Platforms Develop and execute a strategy and standards for a secure DoD cloud environment. Leverage commercial clouds that meet cyber security requirements Minimize program-unique platforms Drive DoD use of standard platforms Design platforms that ensure a secure cyber environment Consolidate data centers and network operations Optimize to a joint enterprise architecture with secure access STREAMLINE PROCESSES 4. Enable Agile IT 5. Strengthen IT Governance 6. Leverage Strategic Sourcing for IT Commodities Lead the development of an Agile IT development methodology Provide Guidance to DoD On Agile IT Best Practices Restructure IT governance boards for enterprise view  Improve DoD IT decisions, strategies, investments Streamline compliance processes Implement an enterprise approach for the procurement of common IT H/W & S/W Establish a DoD Commodity Council 7. Strengthen Cybersecurity 8. Strengthen IT Investments 9. Improve Enterprise Architecture Effectiveness Develop enterprise cyber situational awareness including authentication Leverage automated tools and continual assessments Streamline certification and reinforce reciprocity Obtain transparency of IT investments Align IT Investments to DoD strategies Review performance of major investments Transition document based process to decision support model Develop EA Implementation Plan and Instruction $ STRENGTHEN WORKFORCE 10. Modernize IT Guidance and Training Provide guidance to DoD on adoption of Agile IT best practices Leverage ongoing workforce initiatives Develop a robust IT acquisition community ENABLING AGILE, SECURE, EFFICIENT, AND EFFECTIVE DOD IT For more information go to dodcio.defense.gov/ITModernization (*website not yet active)

DOD IT MODERNIZATION Summary Talking Points CONSOLIDATE INFRASTRUCTURE 1. Consolidate Enterprise Networks 2. Deliver DoD Enterprise Cloud 3. Standardize IT Platforms Consolidate data centers and network operations Develop and implement enterprise-level guidance and policies for IT optimization and consolidation Achieve further consolidation by integrating and capitalizing on test and integration centers Optimize to a joint enterprise architecture with secure access Use centrally managed architectures that use standardized joint processes Define a common security architecture for CORE and DoD network infrastructures Develop and execute a strategy and standards for a secure DoD cloud environment. Publish the DoD Cloud Computing Strategy Transition to cloud will drive adoption of a cyber-secure, dependable enterprise cloud computing environment for DoD Lead the development of the Department’s mobile technology strategy Leverage commercial clouds that meet cyber security requirements Use FedRAMP to assist in developing trusted relationships with cloud providers. Minimize program-unique platforms Quickly establish a set of initial standard platforms that will be modified and reduced in number over time Drive DoD use of standard platforms Standup a working group to provide governance to the identification and evolution of the standard platforms Design platforms that ensure a secure cyber environment Develop strategy to identify existing platforms and a modernization plan that supports a cyber-secure environment STREAMLINE PROCESSES 4. Enable Agile IT 5. Strengthen IT Governance 6. Leverage Strategic Sourcing for IT Commodities Lead the development of an Agile IT development methodology Develop based on the successes of Agile, Lean, and other IT management best practices Provide Guidance to DoD On Agile IT Best Practices Publish the DoD Agile IT Handbook in cooperation with OSD/AT&L and DCMO Structure IT programs via smaller, frequent deliveries Active user involvement and responsive to changes Restructure IT governance boards for enterprise view  Conduct analysis on CIO interaction with major DoD processes, current governance boards, and management tools Improve DoD IT decisions, strategies, investments Coordinate and implement new governance processes and any new governance forums Streamline compliance processes Eliminate the need a separate CCA compliance process; compliance is met by CIO participation in milestone reviews Implement an enterprise approach for the procurement of common IT H/W & S/W Develop a standard strategic sourcing process template for DoD Review and analyze current IT hardware spending and identify a standard set of hardware for DoD-wide procurement Save a min of 15% at purchase and another 15% over the next two years after purchase Establish a DoD Commodity Council Co-chaired by AT&L/DPAP and DoD CIO 7. Strengthen Cybersecurity 8. Strengthen IT Investments 9. Improve Effectiveness of Enterprise Architecture Develop enterprise cyber situational awareness including authentication Establish a consistent enterprise cybersecurity architecture that is integrated into all aspects of DoD IT Enterprise Architecture Leverage automated tools and continual assessments Publish new guidelines for risk management and continuous monitoring Streamline certification and reinforce reciprocity Establish and track metrics for reciprocity Obtain transparency of IT investments Develop an IT Investment Management program that will focus on examining the full DoD IT investment portfolio Align IT Investments to DoD strategies Review major IT investments for system performance, funding execution, and enterprise alignment annually Review performance of major investments Establish a process to identify, assess, and account IT investments that are not currently reported in DoD IT budget Transition document based process to decision support model Promulgate a DoD instruction that describes how the enterprise architecture will be used to realize outcomes and support DoD processes Develop EA Implementation Plan and Instruction Describes the vision, outcomes, strategy, governance, processes, and products for the DoD CIO enterprise architecture efforts STRENGTHEN WORKFORCE 10. Modernize IT Guidance and Training Provide guidance to DoD on adoption of Agile IT best practices Incorporate Agile IT in competency model reviews Include Agile IT into DAU and continuing education curriculum Leverage ongoing workforce initiatives Align IT Modernization with IT Acquisition Workforce Strategic Plan Develop a robust IT acquisition community Recognize personnel effectively implementing Agile IT practices