The Role of State IT in Homeland Security

advertisement
The Role of State IT in
Homeland Security
Robert L. Womack
Director, State and Local Government
Computer Associates International, Inc.
13 October 2004
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Outline
 Challenges
 Federal Guidance
 NASCIO Vision – a Homeland Security
Dashboard
 Concerns implied by the NASCIO Vision
 Enterprise Concerns
 Intelligence Concerns
 Situational Awareness Concerns
 Next Steps
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Today’s Challenges
New Challenges seen since 9/11
 Must assume that new attacks are possible
and probable – need to build systems to
“warn, detect, defend & restore”
 Attacks will be against:
 Information Systems
 People and Property
 All critical infrastructures are at risk and
novel attacks are possible
 “Intelligence” and “knowledge” within each
infrastructure are precious resources – need
to leverage this resource
 Since 9/11, we have learned that a vast
quantity of data has little or no value in its
undigested form.
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Today’s Challenges*
 But, great added value comes when the data
from multiple sources is…
 collected in an organized way from vigilant and
discerning sources in a timely and comprehensive
manner,
 analyzed for short-term and long-term as well as
localized and widespread implications,
 disseminated to appropriate recipients to
 alert potential targets,
 apprehend potential perpetrators, and
 inform incident managers in order to prevent attacks, reduce
vulnerabilities to attacks, and expedite recovery from attacks.
*This presentation is based on a line of reasoning first discussed in an as yet unpublished
NASCIO white paper. NASCIO, “Using Information and Communications Technology to Support
the State Homeland Security Mission” draft dated May 7, 2004. While this document has not yet
been formally approved, we believe it makes a compelling case.
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Today’s Challenges
Using secure information and knowledge systems to
protect our nation’s critical infrastructures
 Systems must leverage “human intelligence”
 Systems must become intelligent:
 Learn from all the data available
 Present information intuitively
 Be brilliant 24 x 7 x 365
 Be secure
Need to turn data into knowledge and action
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Front Line Integrated Threat Analysis Support
Tailored visualization of operational real-time and
historical information that officers can act on
Human
support
Defined rules, Intelligence and workflow to support
information processing and knowledge management
Secure, identity-& role-based, access control to Infrastructure
indications & warnings
support
A secure, robust network & information
infrastructure
Crisis management support for emergencies and
disaster recovery
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Federal Guidance
 The National Strategy for the Physical Protection of Critical
Infrastructures and Key Assets states:
 All U.S. states and territories have established homeland security
liaison offices to manage their counter-terrorism and infrastructure
protection efforts.
 Like the federal government, states should identify and secure the
critical infrastructures and key assets under their control.
 States should promote the coordination of protective and
emergency response activities and resource support among
local jurisdictions and between regional partners
 States should further facilitate coordinated planning and
preparedness by applying unified criteria for determining
criticality, prioritizing protection investments, and exercising
preparedness within their jurisdictions.
 They should also act as conduits for requests for federal assistance
when the threat at hand exceeds the capabilities of state and local
jurisdictions and the private entities within them.
 States should also facilitate the exchange of relevant security
information and threat alerts down to the local level.
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Federal Guidance
 “FY 2005 is a start up year for [National Incident Management
System] NIMS implementation and full compliance with the NIMS is
not required for you to receive FY 2005 grant funds. Since FY 2005
is a critical year for initial NIMS adoption, you should start now
by prioritizing your FY 2005 preparedness assistance (in
accordance with the eligibility and allowable uses of the grant)
to facilitate its implementation.”
 “States, territories, tribes, and local entities are encouraged to
achieve full NIMS implementation during FY 2005. To the extent
that full implementation is not possible during FY 2005, Federal
preparedness assistance must be leveraged to complete NIMS
implementation by FY 2006. By FY 2007, Federal preparedness
assistance will be conditioned by full compliance with the NIMS.”
Secretary Tom Ridge
Department of Homeland Security
“Letter to Governors” dated 8 September 2004
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Draft NASCIO Vision
 The Homeland Security Dashboard
 Is the business of the state IT organization
 Is a decision support tool based on current
information and communications technologies
 Forms the core of an integrated threat analysis center
for the state’s homeland security team
 Is the primary source for “actionable intelligence”
 Leverages state IT investments to provide a common
operating picture and “situational awareness” to both
first responders and “first preventers”
 Will be encouraged by the National Incident
Management System (NIMS) standards.
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Concerns Implied by the NASCIO Vision
 Enterprise Concerns
 Intelligence Concerns
 Situational Awareness Concerns
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Enterprise Concerns
 Use an existing enterprise advisory or governing board
to assess the current and likely impact of homeland
security information and communications technology
(ICT) on the state enterprise. Tomorrow’s silos are being
built today.
 Use an existing enterprise architecture (EA) advisory or
governing board to assess the impact of homeland
security decision support needs on the larger state EA
program in order to support needs for flexible, secure,
reliable, and appropriately handled homeland security
information.
 Identity management must be at the heart of homeland
security decision support systems. Does the current
identity management strategy provide the necessary
foundation for homeland security decision support? How
must the current strategy be changed or extended?
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Intelligence Concerns
 Download the Global Intelligence Working Group’s “National
Criminal Intelligence Sharing Plan” at
http://it.ojp.gov/topic.jsp?topic_id=93.
 Assess the impact of moving sensitive law enforcement, homeland
security, and health care information across the statewide ICT
infrastructure.
 Assess the implications for developing a statewide intelligence
“fusion” center, information sharing and analysis program, or critical
infrastructure protection (CIP) office where analysis of intelligence
will be conducted and warnings/alerts produced.
 Be prepared to contribute intelligence regarding physical and
“cyber”-based threats to state government’s critical
information assets as part of the state’s larger intelligencegathering efforts. “Strobes” of IT systems supporting first
responders may be a precursor to an attack.
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Situational Awareness Concerns
 Download FEMA’s National Incident Management
System (NIMS) plan at
http://www.dhs.gov/dhspublic/display?content=3258.
Watch for compliance guidelines to be issued in October
2004.
 Assess the impact of requirements for complying with
NIMS. Pay close attention to chapter five
“Communication and Information Management” and tab
nine “Examples of ICS Forms,” which will likely lead
XML-based standards development for interjurisdictional document exchange.
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Actionable Intelligence
Get the right information
to the right person
at the right time
in the right way
DoIT
DHS
IJIS
IT Security
Systems
Information
Sources
Enterprise Resource Management
Information Knowledge
Information Delivery
Information Gateway
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Next Steps
 Participate in homeland security planning.
 Consider IT security as you deploy new
applications.
 Remember that alerts from your IT security
system(s) are valuable inputs to your state’s
integrated threat analysis center.
 Assist your CISO community in making cyber
security a part of your state/agency’s homeland
security plan.
 If you support First Responders, begin NIMS
planning this year.
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Questions?
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
References
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
First Responder Grant Budget Trends
DHS First Responder Funding
4.2
4.1
$ Billions
4
3.6
3.75
3.75
3.8
3.6
3.5
3.4
3.2
3
FY 2003 Final
FY 2004 Final
Fiscal Year
Source: INPUT, 5 October 2004
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
FY 2005
DHS / ODP Permitted Spending for Cyber Security
 Intrusion Detection
 Configuration Management
and Patch Distribution
 Scanning and Detection
Tools
 Geographic Information
Systems
 Network Systems
Management (NSM) and
Analysis
 Encryption Systems
 Firewall and
Authentication
 Security Hardware and
Software for Counter
measures
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Security Control Center
Data On Demand
Integrated Security View
Physical Security
View
Cyber-security View
www transferred data (KBytes)
Top 10 Active Clients
Real Time – Or –
Time Lapse
Total
security
violations
Entering Cyberspace
Compile, Display & Analyze Security Events from Disparate Sources
-- Fully Customizable for Group or Individual Needs
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Physical Security View
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
CA Fast Facts






Founded in 1976
Headquartered in Islandia, New York
Fiscal Year 2004 revenues of $3.28 billion
More than15,000 employees in more than 40 countries
Committed to the highest corporate governance standards
Executive Team







Lewis Ranieri, Chairman
Kenneth Cron, Interim Chief Executive Officer
Jeff Clarke, Chief Operating Officer and Chief Financial Officer
Kenneth Handal, Executive Vice President and General Counsel
Mark Barrenechea, Executive Vice President of Product Development
Greg Corgan, Executive Vice President of Worldwide Sales
Yogesh Gupta, Chief Technology Officer
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
CA Leadership Credentials
 Shaping the industry through innovation




Pioneered enterprise systems management software
Awarded 280 patents for advanced technology solutions
Active in every major standards organization
First to earn the International Organization for Standardization’s (ISO)
9002:1994 Global Certification and 9001:2000, the new, ultimate ISO
certification
 Only company to use one system to manage quality throughout its
worldwide operations
 World’s leading businesses partner with us
 95 percent of the Fortune 500® as well as thousands of other companies
worldwide use our software
 Partnerships drive success
 Developed significant relationships with customers, industry peers and
community organizations
 Organized channel operations to make it easier for customers of all
sizes to purchase and use CA solutions
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Contacts
 Contacts for more information:
 Erin Sullivan
 VP, State and Local Government – 908-531-0128
 Rod Hovater
 Account Director – State and Local – 770-953-3640
 Bob Womack
 Business Development Director – HLS – 617-733-5741
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
The Role of State IT in
Homeland Security
Robert L. Womack
Director, State and Local Government
Computer Associates International, Inc.
13 October 2004
© 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos referenced herein belong to their respective companies.
Download